Carrier Lines All Participants acknowledge that the Transaction of Message Content between Participants is to be provided over various facilities and communications lines, and information shall be transmitted over local exchange and Internet backbone carrier lines and through routers, switches, and other devices (collectively, “carrier lines”) owned, maintained, and serviced by third-party carriers, utilities, and Internet service providers, all of which may be beyond the Participants’ control. Provided a Participant uses reasonable security measures, no less stringent than those directives, instructions, and specifications contained in this Agreement, the Performance and Service Specifications, and the Operating Policies and Procedures, the Participants assume no liability for or relating to the integrity, privacy, security, confidentiality, or use of any information while it is transmitted over those carrier lines, which are beyond the Participants’ control, or any delay, failure, interruption, interception, loss, transmission, or corruption of any Message Content or other information attributable to transmission over those carrier lines which are beyond the Participants’ control. Use of the carrier lines is solely at the Participants’ risk and is subject to all Applicable Law.
Supplier Code of Conduct At all times during the term of this Agreement, Seller will comply with the Apple Supplier Code of Conduct ("Code of Conduct"), as amended by Apple from time-to-time, available from Apple’s public website at xxxxx://xxx.xxxxx.xxx/supplier-responsibility/. Notwithstanding anything to the contrary herein, Seller will: (i) allow Apple and a third party representative, retained by or representing Apple (collectively, the "Auditor"), to assess Seller’s compliance with the Code of Conduct by inspecting Seller’s facilities and/or reviewing Seller’s practices, policies, and relevant records without notice, and/or by interviewing Seller’s personnel without monitoring, solely to verify Seller’s compliance with the Code of Conduct (collectively, an "Assessment"); (ii) promptly provide the Auditor with access to any relevant facilities and personnel without disruption or interference, in connection with any Assessment; (iii) promptly provide complete and accurate information and documentation in response to the Auditor’s requests, (iv) allow the Auditor to review and assess working hours and conditions, remuneration and benefits, personnel practices, production, dormitory, and dining facilities, business conduct, and health, safety, and environmental practices, as applicable, in connection with any Assessment; (v) not request or encourage, directly or indirectly, any Seller personnel to furnish false or incomplete information in connection with any Assessment; (vi) not take retaliatory action against any Seller personnel interviewed during an Assessment; and
Illicit Code Except for the functions and features expressly disclosed in Supplier's documentation made available to Accenture, Deliverables will be free of any programs, subroutines, code, instructions, data or functions, (including but not limited to viruses, malware, worms, date bombs, time bombs, shut-down devices, keys, authorization codes, back doors or passwords allowing Supplier access) that may result in any inoperability, damage, interruption, or interference of the Deliverables or any equipment on which the Deliverables reside or with which the Deliverables are capable of communicating.
Dress Code CONTRACTOR shall maintain a dress code for their employee’s with a minimum of shirts, pants, and work shoes/boots, in decent condition, at all times while the work is being performed. In the event the COUNTY determines ID badges are necessary, the COUNTY will provide CONTRACTOR with ID badges and CONTRACTOR agrees to enforce that its employees, whether employed by CONTRACTOR or a subcontractor, wear such ID badge while working on site for the Project/Service.
Spam 3.1 Also known as junk mail or Unsolicited Commercial Email (UCE), the term "spam" refers to submitting a commercial email or SMS message to a large number of recipients who have not requested or opted to receive it and have no reasonable expectation to receiving email or SMS from the sender.
Network Etiquette You are expected to abide by the generally accepted rules of network etiquette. These include but are not limited to the following:
REGISTRY OPERATOR CODE OF CONDUCT 1. In connection with the operation of the registry for the TLD, Registry Operator will not, and will not allow any parent, subsidiary, Affiliate, subcontractor or other related entity, to the extent such party is engaged in the provision of Registry Services with respect to the TLD (each, a “Registry Related Party”), to:
Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.
Access Codes Tenant shall provide Landlord/Broker with all access codes to all entrance gates and security systems located on the Property.
Local Switching Interfaces 4.2.13.1 Newcomm shall order ports and associated interfaces compatible with the services it wishes to provide as listed in Exhibit A. BellSouth shall provide the following local switching interfaces: