Use of Facility The Facility will be used for the purposes specified in the Recital.
Excess/Umbrella Liability Policies Required insurance coverage limits may be provided through a combination of primary and excess/umbrella liability policies. If coverage limits are provided through excess/umbrella liability policies, then a Schedule of underlying insurance listing policy information for all underlying insurance policies (insurer, policy number, policy term, coverage and limits of insurance), including proof that the excess/umbrella insurance follows form must be provided after renewal and/or upon request.
Credit Policy Subject to Section 6.01(h), the Borrower will not consent to Regional Management’s amendment, modification, restatement or replacement, in whole or in part, of the Credit Policy, which change could adversely affect the interests or the remedies of the Secured Parties under the Basic Documents, without the prior written consent of the Administrative Agent (acting at the direction of the Required Lenders) (and the Required Lenders shall use commercially reasonable efforts to respond to such consent request within five Business Days of their receipt thereof).
Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
General Policies 6.2.4.1 Each Party’s resources are for approved business purposes only. 6.2.4.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 6.2.4.3 Individuals will only be given access to resources that they are authorized to receive, and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 6.2.4.4 Authorized users must not develop, copy or use any program or code that circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 6.2.4.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.
Safety Policy The City agrees to maintain in safe working condition all facilities and equipment furnished by the City to carry out the duties of each bargaining unit position, but reserves the right to determine what those facilities and equipment shall be. The Association agrees to work cooperatively in maintaining safety in the Xenia/Xxxxxx Central Communications Center.
Umbrella Policies Contractor may satisfy basic coverage limits through any combination of basic coverage and umbrella insurance.
Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”). Data Escrow. Registry Operator shall comply with the registry data escrow procedures set forth in Specification 2 attached hereto (“Specification 2”).
Use of Facilities and Services Subject to the rules of the University and the terms of this Agreement, the UFF shall have the right to use University facilities for meetings and all other services on the same basis as they are generally available to other university-related organizations which are defined as follows: University-Related Groups and Organizations. These groups and organizations may or may not receive budgetary support. Examples of such groups include student organizations, honor societies, fraternities, sororities, alumni associations, faculty committees, University Support Personnel Systems council, direct support organizations, the United Faculty of Florida, etc.
Use of Facilities 34.1. In situations where the CLEC has the use of the facilities (i.e., local loop) to a specific customer premise, either through resale of local service or the lease of the local loop as an Unbundled Network Element, and Sprint receives a good faith request for service from a customer at the same premise or from another carrier with the appropriate customer authorization, the procedures below will apply. 34.1.1. Sprint will process such orders and provision services consistent with the terms contained in Section 82, of this Agreement. 34.1.2. Where CLEC is using a single facility to provide service to multiple end user customers, Sprint will not disconnect that facility as a result of the following procedures. 34.1.3. Sprint will follow methods prescribed by the FCC and any applicable state regulation for carrier change verification. 34.1.4. Customer with Existing Service Changing Local Service Provider 34.1.4.1. In situations where a CLEC submits an order for an end user customer that is changing local service providers for existing service, and is not adding service (i.e., an additional line), Sprint will process the service request without delay, and provide the losing local service provider a customer loss notification consistent with industry standards. 34.1.5. Customer with Existing Service Adding New Service 34.1.5.1. In situations where an order is submitted for an end user customer adding service to existing service (i.e., an additional line), the order should be marked as an additional line and CLEC’s facilities will not be affected. 34.1.6. Customer Requesting New Service where Previous Customer has Abandoned Service 34.1.6.1. In the case where an end user customer vacates premises without notifying the local service provider and a new end user customer moves into the vacated premises and orders new service from a local service provider neither Sprint nor the previous local service provider are aware that the original end user customer has abandoned the service in place. 34.1.6.2. When a carrier requests service at a location and marks the order as abandoned and CLEC is the previous local service provider, Sprint shall notify CLEC via fax that it has had a request for service at the premise location that is currently being served by CLEC; 34.1.6.3. If available to Sprint, Sprint shall include the name and address of the party receiving service at such locations, but at a minimum shall provide local service address location information; 34.1.7. If CLEC does not respond within twenty-four (24) hours after receiving Sprint’s notification or if CLEC responds relinquishing the facilities, Sprint shall be free to use the facilities in question and Sprint shall issue a disconnect order with respect to the CLEC service at that location. If CLEC responds stating that the service is working and should not be disconnected, Sprint will notify the carrier ordering service and request verification of the address and location or the submission of an order for an additional line.