Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
APPOINTMENT; DELIVERY OF DOCUMENTS (a) The Advisor hereby appoints and employs the Sub-advisor, subject to the direction and control of the Board, to manage the investment and reinvestment of the assets of all or a portion of the Fund allocated by the Advisor to the Sub-advisor from time to time (such assets, the “Portfolio”) and, without limiting the generality of the foregoing, to provide other services as specified herein. The Sub-advisor accepts this employment and agrees to render its services for the compensation set forth herein. (b) In connection therewith, the Advisor has delivered to the Sub-advisor copies of (i) the Trust’s Declaration of Trust and Bylaws (collectively, as amended from time to time, the “Charter Documents”), (ii) the Trust’s current Prospectus and Statement of Additional Information for the Fund (collectively, as currently in effect and as amended or supplemented, the “Registration Statement”) filed with the U.S. Securities and Exchange Commission (“SEC”) pursuant to the Securities Act of 1933, as amended (the “Securities Act”), and the 1940 Act, (iii) each plan of distribution or similar document adopted by the Trust with respect to the Fund under Rule 12b-1 under the 1940 Act (each a “Plan”) and each current shareholder service plan or similar document adopted by the Trust with respect to the Fund (each a “Service Plan”); and (iv) all procedures adopted by the Trust with respect to the Fund, and shall promptly furnish the Sub-advisor with all amendments of or supplements to the foregoing. The Advisor shall deliver to the Sub-advisor: (x) a copy of the resolution of the Board appointing the Sub-advisor as a sub-advisor to the Fund and authorizing the execution and delivery of this Agreement; (y) a copy of all proxy statements and related materials relating to the Fund; and (z) any other documents, materials or information that the Sub-advisor shall reasonably request to enable it to perform its duties pursuant to this Agreement. (c) The Sub-advisor has delivered to the Advisor and the Trust (i) a copy of its Form ADV as most recently filed with the SEC; (ii) a copy of its code of ethics complying with the requirements of Rule 17j-1 under the 1940 Act (the “Code”); and (iii) a copy of its compliance manual pursuant to applicable regulations, including its proxy voting policies and procedures, which proxy voting policy and procedures will be included in the Trust’s registration statement. The Sub-advisor shall promptly furnish the Advisor and Trust with all amendments of and supplements to the foregoing at least annually.
Telephone Monitoring You agree that Chase and its third-party service providers may listen to and record telephone calls as part of providing program services.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.
Delivery of replacements Subject to receipt of sufficient Temporary Global Notes, Permanent Global Notes, Definitive Notes, Coupons, Global Note Certificates and Individual Note Certificates in accordance with Clause 3.9 (Duties of Principal Paying Agent, Registrar and Replacement Agent), the Replacement Agent shall, upon and in accordance with the instructions (which instructions may, without limitation, include terms as to the payment of expenses and as to evidence, security and indemnity satisfactory to the Replacement Agent) of the Relevant Issuer but not otherwise, authenticate (if necessary) and deliver a Temporary Global Note, Permanent Global Note, Definitive Note, Coupon, Global Note Certificate or Individual Note Certificate as the case may be, as a replacement for any of the same which has been mutilated or defaced or which has or has been alleged to have been destroyed, stolen or lost provided, however, that: 5.1.1 Surrender or destruction: no Temporary Global Note, Permanent Global Note, Definitive Note, Coupon, Global Note Certificate or Individual Note Certificate as the case may be, shall be delivered as a replacement for any of the same which has been mutilated or defaced otherwise than against surrender of the same or, in the case of an NGN Temporary Global Note or an NGN Permanent Global Note or a Global Note Certificate to be held under the NSS, appropriate confirmation of destruction from the Common Safekeeper; and
Incident Event and Communications Management a. Incident Management/Notification of Breach - DST shall develop, implement and maintain an incident response plan that specifies actions to be taken when DST or one of its subcontractors suspects or detects that a party has gained material unauthorized access to Fund Data or systems or applications containing any Fund Data (the “Response Plan”). Such Response Plan shall include the following: i. Escalation Procedures - An escalation procedure that includes notification to senior managers and appropriate reporting to regulatory and law enforcement agencies. This procedure shall provide for reporting of incidents that compromise the confidentiality of Fund Data (including backed up data) to Fund via telephone or email (and provide a confirmatory notice in writing as soon as practicable); provided that the foregoing notice obligation is excused for such period of time as DST is prohibited by law, rule, regulation or other governmental authority from notifying Fund. ii. Incident Reporting - DST will use commercially reasonable efforts to promptly furnish to Fund information that DST has regarding the general circumstances and extent of such unauthorized access to the Fund Data.
Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.
Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.
Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.
Electronic Monitoring All observations shall be conducted openly. Mechanical or electronic devices shall not be used to listen to or record the procedures of any class without the prior knowledge and consent of the teacher.