CAT System Sample Clauses

CAT System. Subject to the terms of this Agreement, CATLLC hereby grants CAT Reporting Agent access to the CAT System and the ability to use the CAT System. CAT Reporting Agent may access and use the CAT System only on behalf of a CAT Reporter that has engaged and authorized CAT Reporting Agent within the CAT System to (a) submit CAT Data on behalf of that CAT Reporter related to the business operations of that CAT Reporter and/or (b) correct CAT Data submitted on behalf of that CAT Reporter as provided in Section 3.3 (as applicable).
CAT System. Subject to the terms of this Agreement, CATLLC hereby grants CAT Reporter access to the CAT System and the ability to use the CAT System. CAT Reporter may access and use the CAT System only for the purpose of submitting CAT Data related to its business operations and correcting such CAT Data as provided in Section 3.3 and, in the event that CAT Reporter is a Participant, for such other uses as set forth in the CAT NMS Plan. CAT Reporter expressly consents to CATLLC’s, the Participants’, and the Plan Processor’s use of the submitted CAT Data, provided that such use is authorized by the CAT NMS Plan. CAT Reporter and CATLLC acknowledge that CATLLC, the Participants, and the Plan Processor are not authorized by the CAT NMS Plan to use the submitted CAT Data for commercial purposes, provided that a Participant which is a CAT Reporter may use its own submitted Raw Data for such purposes.

Related to CAT System

  • System Except as otherwise provided herein, the Trustee shall not be accountable for the use or application by the Company or the Master Servicer of any of the Certificates or of the proceeds of such Certificates, or for the use or application of any funds paid to the Company or the Master Servicer in respect of the Mortgage Loans or deposited in or withdrawn from the Custodial Account or the Certificate Account by the Company or the Master Servicer.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Internet Connection Certain Solutions may require an active and stable connection to the Internet in order to function. It is therefore your responsibility to ensure that you have at all times an active and stable Internet connection.

  • PFPC System PFPC shall retain title to and ownership of any and all data bases, computer programs, screen formats, report formats, interactive design techniques, derivative works, inventions, discoveries, patentable or copyrightable matters, concepts, expertise, patents, copyrights, trade secrets, and other related legal rights utilized by PFPC in connection with the services provided by PFPC to the Fund.

  • IT Systems Except as would not, individually or in the aggregate, have a Material Adverse Effect, the Company reasonably believes that (i) the Company and the Subsidiaries own or have a valid right to access and use all computer systems, networks, hardware, software, databases, websites, and equipment used to process, store, maintain and operate data, information, and functions used in connection with the business of the Company and the Subsidiaries (the “Company IT Systems”), (ii) the Company IT Systems are adequate for, and operate and perform as required in connection with, the operation of the business of the Company and the Subsidiaries as currently conducted and (iii) the Company and the Subsidiaries have implemented reasonable backup, security and disaster recovery technology consistent with applicable regulatory standards;

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • CONTROL SYSTEM (a) SELLER shall provide and maintain a quality control system to an industry recognized Quality Standard and in compliance with any other specific quality requirements identified in this Contract. (b) Records of all quality control inspection work by SELLER shall be kept complete and available to LOCKHEED XXXXXX and its customers.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS