Application for Unauthorized Attachments Sample Clauses

Application for Unauthorized Attachments. If Licensee attaches its Facilities without permission, without following a procedure or requirement which is substantially in accordance with this Agreement, or without compliance with the Pole Requirements, such Attachment shall constitute an “Unauthorized Attachment”. If any of Licensee’s Facilities for which no permission to attach has been issued by Grantor shall be found attached to Grantor’s Poles, Grantor may require Licensee to submit, within sixty (60) days after the date of notification from Grantor of the Unauthorized Attachment, a Pole Attachment Application form. If the Licensee fails to correct the Unauthorized Attachment within one hundred eighty (180) or more days, then the Grantor may request an order from the OPUC authorizing removal of the Licensee’s Attachments. Nothing in this section precludes a Party from pursuing other legal remedies. Further, should the Grantor discover, at any time, an Attachment that is permitted, but otherwise in violation of the terms and conditions of this License Agreement, the Grantor shall notify Licensee, and excepting emergency and/or safety situations, Licensee shall provide a cure plan within sixty (60) days after the date of such written notification and/or correct the non-compliance within one hundred eighty (180) days of the notification. In those instances where Licensee’s failure to conform to the terms and conditions of this Agreement result in an emergency and or safety situation, the Grantor may, but is not required to, cure the situation and/or remove Licensee’s Facilities at Licensee’s sole risk and expense. In either case, the Unauthorized Attachment(s) may be subject to an Unauthorized Attachments Charge as described in section 5.3.
AutoNDA by SimpleDocs

Related to Application for Unauthorized Attachments

  • Application of Agreement If the Company has secured work outside of the County of Cumberland, an employee whom normally works within the County of Cumberland: i) Will be paid at the rates outlined in this agreement if specifically requested by the Company to work on that site. ii) May be offered work at that location at the rates that apply for that area and if applicable, taking into account clause 27, Distant Work. iii) May determine that redundancy would be more appropriate. Where there is any inconsistency between this Agreement and the Parent Award, the Agreement shall prevail to the extent of the inconsistency.

  • Notice of variation of order of application The Agent may give notices under Clause 17.2 from time to time; and such a notice may be stated to apply not only to sums which may be received or recovered in the future, but also to any sum which has been received or recovered on or after the third Business Day before the date on which the notice is served.

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release. (b) Vendor will provide such notification to the District by contacting Xxxxxx Xxx, Data Protection Officer, directly by email at xxxxxx.xxx@xxxxx.xxx or by calling 000-000-0000. (c) Vendor will cooperate with the District and provide as much information as possible directly to Xxxxxx Xxx, Data Protection Officer or his/her designee about the incident, including but not limited to: a description of the incident, the date of the incident, the date Vendor discovered or was informed of the incident, a description of the types of Protected Data involved, an estimate of the number of records affected, the schools within the District affected, what the Vendor has done or plans to do to investigate the incident, stop the breach and mitigate any further unauthorized access or release of Protected Data, and contact information for Vendor representatives who can assist affected individuals that may have additional questions. (d) Vendor acknowledges that upon initial notification from Vendor, the District, as the educational agency with which Vendor contracts, has an obligation under Section 2-d to in turn notify the Chief Privacy Officer in the New York State Education Department (“CPO”). Vendor agrees not to provide this notification to the CPO directly unless requested by the District or otherwise required by law. In the event the CPO contacts Vendor directly or requests more information from Vendor regarding the incident after having been initially informed of the incident by the District, Vendor will promptly inform Xxxxxx Xxx, Data Protection Officer or his/her designee.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • New Application for Licensure Any time after the three-month period has lapsed from the Effective Date of this Agreement and Respondent has paid the Administrative Penalty set forth in Section III, Paragraph 1 of this Order, Respondent may apply for a new mortgage loan originator license or, as applicable, petition for the reinstatement of an MLO Activity Endorsement in any or all of the Participating States with the understanding that each State Mortgage Regulator reserves the rights to fully investigate such application for licensure or petition for reinstatement of an MLO Activity Endorsement and may either approve or deny such application or petition pursuant to the normal process for such licensing or endorsement investigations. No license application or petition described in this paragraph will be denied solely based on the facts, circumstances, or consensual resolution provided for in this Agreement. Respondent further agrees that Respondent must satisfy the Administrative Penalty provision prior to submitting an application for a new mortgage loan originator license or, as applicable, petition for the reinstatement of an MLO Activity Endorsement.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Auction Schedule; Method of Submission of Orders (a) The Funds and the Auction Agent shall conduct Auctions for each series of Preferred Shares in accordance with the schedule set forth below. Such schedule may be changed at any time by the Auction Agent with the consent of the Fund, which consent shall not be withheld unreasonably. The Auction Agent shall give notice of any such change to BD. Such notice shall be received prior to the first Auction Date on which any such change shall be effective. Time Event ---- ----- By 9:30 A.M. Auction Agent advises the Funds and the Broker-Dealers of the Maximum Rate as set forth in Section 3.2(a) hereof.

  • Application Form To apply for a pole attachment or conduit occupancy license under this Agreement, Applicant shall submit to SWBT two signed copies of the appropriate application forms. SWBT represents that the forms specified in subsections (a)-(b) are forms in use prior to the effective date of this Agreement and that SWBT is in the process of revising such forms to conform to the provisions of this Agreement and to streamline the application process. The parties therefore agree that the forms specified in subsections (a) and (b) will be interim forms only. SWBT reserves the right to change the format and content of these forms upon 60 days written notice to Applicant. (a) To apply for a pole attachment license, Applicant shall submit to SWBT two signed copies of SWBT’s Form SW-9434 (“Access Application and Make- Ready Authorization”) together with completed Form SW-9433 (“Pole Attachments”). An application for a pole attachment license will not be complete or subject to processing by SWBT until these forms have been submitted to SWBT; provided, however, that such forms will be deemed to be substantially complete if they contain the information specified in subsections (c)-(h) below, as applicable. Copies of Forms SW-9433 and SW-9434 are attached to this Agreement as parts of APPENDIX III. (b) To apply for a conduit occupancy license, Applicant shall submit to SWBT two signed copies of SWBT’s Form SW-9434 (“Access Application and Make-Ready Authorization”) together with completed Form SW-9435 (“Conduit Occupancy”). An application for a conduit occupancy license will not be complete or subject to processing by SWBT until these forms have been submitted to SWBT; provided, however, that such forms will be deemed to be substantially complete if they contain the information specified in subsections (c)-(h) below, as applicable. Copies of Forms SW-9434 and SW-9435 are attached to this Agreement as parts of APPENDIX III. (c) Each application for a license under this Agreement shall include, at a minimum, the following information: (1) the poles, ducts, and conduits (including all manholes) along Applicant’s proposed route to or within which Applicant desires to attach or place its facilities; (2) a description of the facilities to be attached to SWBT’s poles and a description of the facilities to be placed within each component of SWBT’s conduit system (including but not limited to ducts, conduits, manholes, and handholes) along the proposed route; (3) for poles, the proposed points of attachment; (4) for building entrance or building distribution ducts or conduits or other space within a building, a conspicuous statement, as required by Section 5.06 of this Agreement, that the application pertains to a building entrance or building distribution duct or conduit or other space within a building; (5) if applicable, a conspicuous notation that the space requested is not to be assigned (or billed) to Applicant until SWBT has received Applicant’s written instruction to make such assignment or issued a license authorizing Applicant to occupy the space requested; and (6) if applicable, a conspicuous statement that Applicant intends to occupy the space before the issuance of a license, as provided in Section 8.03 of this Agreement. (d) Facilities descriptions which apply to multiple pole attachments or conduit occupancies need only be described once on any form. Facilities descriptions shall include, at a minimum, the following information: (1) the number and types of cables, including the physical size (diameter) and weight (weight per foot); (2) the number and types of strands, if any, which will be used to support the cables, including the rated holding capacity expressed in thousand pound increments (e.g., 2.2M) of such strands; and (3) sufficient information to identify and describe the physical characteristics (size, dimensions, and weight) of apparatus enclosures and other facilities to be attached to SWBT’s poles or placed in SWBT’s conduit system. (e) When it appears to Applicant that facilities modification, capacity expansion, or make-ready work may be required to accommodate Applicant’s access requests, Applicant shall describe the facilities modification, capacity expansion, or make-ready work which Applicant proposes. Applicant shall also describe its plans, if any, to use any infrequent construction technique or connectivity solution authorized under Section 6.03 to avoid high or unusual expenditures and state its reasons for the use of such technique or solution. (f) Applicant acknowledges that the poles along a particular pole line or route may include poles owned by firms (such as electric utilities) other than SWBT, that it may be necessary for SWBT to rearrange its facilities or perform other make-ready work on poles other than poles it owns or controls in order to accommodate Applicant’s request for access to SWBT’s poles and that, at the time an application is submitted, it may be difficult for Applicant to determine with certainty whether a particular pole is owned or controlled by SWBT or by another entity. Accordingly, the application shall, to the extent feasible, identify all poles utilized by SWBT (without regard to ownership) along Applicant’s proposed route. (g) Each application for a license under this Agreement shall be accompanied by a construction schedule showing Applicant’s projected dates for beginning and completing construction at the sites specified in the application. Information on this schedule may be used by SWBT’s engineering and outside plant construction personnel in scheduling work required to process Applicant’s applications and scheduling such capacity expansions, make- ready work, and facilities modifications, if any, as may be necessary to accommodate Applicant’s facilities. (h) Applicant may include multiple cables in a single license application and may provide multiple services (e.g., CATV and non-CATV services) under the same cable sheath or jacket. When both CATV and non-CATV services are provided under the same cable sheath or jacket, or CATV and non-CATV services are provided using different cables attached or lashed to the same strand or otherwise occupying the same space on a pole or the same duct or inner duct within a conduit, Applicant will so advise SWBT and SWBT shall, if permitted by law, adjust its charges to enable SWBT to charge Applicant the rate applicable to telecommunications carriers rather than the rate applicable to cable television systems solely to provide cable service.

  • Variation of order of application The Agent may, with the authorisation of the Majority Lenders and the Swap Bank, by notice to the Borrowers, the Security Parties and the other Creditor Parties provide for a different manner of application from that set out in Clause 17.1 either as regards a specified sum or sums or as regards sums in a specified category or categories.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!