Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.
Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.
Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.
Internet Traffic Any traffic that is transmitted to or returned from the Internet at any point during the duration of the transmission.
Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.
Links If The Services are made available through the Internet, the Financial Institution’s website may provide links to other websites, including those of Third Parties who may also provide services to You. You acknowledge that all those other websites and Third Party services are independent from the Financial Institution’s and may be subject to separate agreements that govern their use. The Financial Institution and Central 1 have no liability for those other websites or their contents or the use of Third Party services. Links are provided for convenience only, and You assume all risk resulting from accessing or using such other websites or Third Party services.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Sites 11.1 To enable Digital Origin to fulfill its obligations under any Contract: 11.1.1 the Client shall permit or procure permission for Digital Origin and any other person(s) authorised by Digital Origin to have reasonable access to the Client’s Sites, Equipment and/or Leased Equipment and any other relevant telephone system and other equipment and shall provide such reasonable assistance as Digital Origin requests. 11.1.2 Digital Origin will normally carry out work by appointment and during Normal Working Hours but may request the Client to (and the Client shall) provide access at other times. In the event that the Client cancels, reschedules or misses any pre-arranged appointment, it shall be liable to Digital Origin for any costs and expenses which Digital Origin incurs as a result of such cancellation, rescheduling and/or missed appointment. 11.2 At the Client’s request, Digital Origin may agree (at its sole discretion) to work outside Normal Working Hours and the Client shall pay Digital Origin’s reasonable charges for complying with such a request. 11.3 The Client warrants, represents and undertakes that it has adequate health and safety provisions in place at its Sites. 11.4 The Client shall procure all consents, licences and permissions necessary from landlords or other third parties for the carrying out of preparation work, installation of Equipment and/or Leased Equipment and for the provision, use and operation of the Equipment and/or Leased Equipment and/or Services at the Sites (save to the extent Digital Origin has agreed in writing to do it). 11.5 In the event that the Client is not able to procure the necessary consent to provide the Services within ninety days of the Connection Date Digital Origin will be able to terminate the Contract forthwith by giving the Client written notice without any liability. If the Client has not managed to procure the necessary consents and Digital Origin has commenced work the Client shall, on request by Digital Origin, refund to Digital Origin the cost of all such work (including, without limitation, staff costs and equipment costs) of an amount no less than £500 as Early Termination Charges. 11.6 The Client shall provide Digital Origin with the site and building plans (to include full details of all internal cabling runs) of the Sites and provide Digital Origin with full details of all other services in the vicinity of the proposed works. 11.7 The Client is responsible for making the Site good after any work undertaken by Digital Origin at a Site, including without limitation replacing and re-siting items and for re-decorating. 11.8 If the Client is moving a Site, Digital Origin must be informed as soon as is reasonably practicable so that suitable arrangements can be made to transfer the Client’s Services and Equipment and/or Leased Equipment. Unless otherwise requested, Digital Origin, in addition to moving the Service and Equipment and/or Leased Equipment, will also endeavour (but cannot guarantee that it will be able, for example where the Client moves to a different exchange) to retain the Client’s relevant existing telephone number(s). If Digital Origin can transfer the Client’s existing number(s) to the new Site the existing Contract will continue under the same terms and conditions. If Digital Origin cannot transfer the Client’s existing number(s) to the new Site, installation of a new line will be required at the new Site, or if the Client requires any additional new lines, this will attract new line connection charges and a new Contract. 11.9 If the new installation or moving Site involves the visit of an engineer to facilitate the new installation the Client will be responsible for the costs incurred by Digital Origin for the appointment together with an administration fee in respect of any additional works required to be undertaken by Digital Origin to complete the transfer of the Services and Equipment and/or Leased Equipment. 11.10 If the Client moves Sites and leaves the Equipment and/or Leased Equipment for the new owner/tenant the Client is required to inform them that the Service will be discontinued if Digital Origin is not contacted by the new owner/tenant within 72 hours for the purpose of entering into a new contract with Digital Origin for such services and subject in any event to the agreement of such a contract. 11.11 If at the new Site the Client receives services from an alternative supplier the Client is responsible for any contractual agreement the Client has with them and any liabilities the Client may incur for terminating such agreement.
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.