COOPERATION IN IMPLEMENTATION On demand of the other Spouse and without undue delay or expense, each Spouse shall execute, acknowledge, or deliver any instrument, furnish any information, or perform any other acts reasonably necessary to carry out the provisions of this Agreement. If a Spouse fails to execute any document as required by this provision, the court may appoint the court clerk or his or her authorized designee to execute the document on that Xxxxxx’s behalf.
Rights Protection Mechanisms and Abuse Mitigation ‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.
Aggravating and Mitigating Factors The penalties in this matter were determined in consideration of all relevant circumstances, including statutory factors as described in CARB’s Enforcement Policy. CARB considered whether the violator came into compliance quickly and cooperated with the investigation; the extent of harm to public health, safety and welfare; nature and persistence of the violation, including the magnitude of the excess emissions; compliance history; preventative efforts taken; innovative nature and the magnitude of the effort required to comply, and the accuracy, reproducibility, and repeatability of the available test methods; efforts to attain, or provide for, compliance prior to violation; action taken to mitigate the violation; financial burden to the violator; and voluntary disclosure. The penalties are set at levels sufficient to deter violations, to remove any economic benefit or unfair advantage from noncompliance, to obtain swift compliance, and the potential costs, risks, and uncertainty associated with litigation. Penalties in future cases might be smaller or larger depending on the unique circumstances of the case.
Uncontrollable Forces Tariff Provisions Section 14.1 of the CAISO Tariff shall be incorporated by reference into this Agreement except that all references in Section 14.1 of the CAISO Tariff to Market Participants shall be read as a reference to the Participating Generator and references to the CAISO Tariff shall be read as references to this Agreement.
Network Maintenance and Management 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.
Mitigation Measures Company shall take commercially reasonable measures (except measures causing it to incur out-of-pocket expenses which BNYM does not agree in advance to reimburse) to mitigate losses or potential losses to BNYM, including taking verification, validation and reconciliation measures that are commercially reasonable or standard practice in the Company’s business.
Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.
Complete Work without Extra Cost Except to the extent otherwise specifically stated in this contract, the Contractor shall obtain and provide, without additional cost to the City, all labor, materials, equipment, transportation, facilities, services, permits, and licenses necessary to perform the Work.
Avoidance of Inconsistent Position; Services Not Exclusive In connection with purchases or sales of portfolio securities and other investments for the account of the Fund, neither you nor any of your directors, officers or employees shall act as a principal or agent or receive any commission. You or your agent shall arrange for the placing of all orders for the purchase and sale of portfolio securities and other investments for the Fund's account with brokers or dealers selected by you in accordance with Fund policies as expressed in the Registration Statement. If any occasion should arise in which you give any advice to clients of yours concerning the Shares of the Fund, you shall act solely as investment counsel for such clients and not in any way on behalf of the Fund. Your services to the Fund pursuant to this Agreement are not to be deemed to be exclusive and it is understood that you may render investment advice, management and services to others. In acting under this Agreement, you shall be an independent contractor and not an agent of the Trust. Whenever the Fund and one or more other accounts or investment companies advised by you have available funds for investment, investments suitable and appropriate for each shall be allocated in accordance with procedures believed by you to be equitable to each entity. Similarly, opportunities to sell securities shall be allocated in a manner believed by you to be equitable. The Fund recognizes that in some cases this procedure may adversely affect the size of the position that may be acquired or disposed of for the Fund.