Consumer Wireless MDU Sample Clauses

Consumer Wireless MDU i. Bargaining Unit employees will Engineer, Configure, Deploy, and Manage commercially launched consumer MDU solutions.
AutoNDA by SimpleDocs

Related to Consumer Wireless MDU

  • Consumer Leases No Receivable constitutes a “consumer lease” under either (a) the UCC as in effect in the jurisdiction the law of which governs the Receivable or (b) the Consumer Leasing Act, 15 USC 1667.

  • Telephone Consumer Protection Act Consent Each Member expressly consents to receiving calls and messages, including auto-dialed and pre-recorded message calls, and SMS messages (including text messages) from the Administrator, its affiliates, agents and others calling at their request or on their behalf, at any telephone numbers that the Member has provided to the Company or Masterworks (including any cellular telephone numbers). Member’s cellular or mobile telephone provider will charge Member according to the type of plan Member carries. Any Member may unsubscribe from receiving text messages or promotional calls at any time by (i) replying STOP, STOPALL, UNSUBSCRIBE, CANCEL, END or QUIT to any text message such Member receives from the Company or Masterworks or (ii) email to sxxxxxx@Xxxxxxxxxxx.xx with one of the forgoing words in the subject line. Each Member acknowledges and consents that following such a request to unsubscribe, such Member may receive one final text message from Masterworks confirming such request.

  • Network 2.7.1 DCH will provide to the Contractor up-to-date changes to the State’s list of excluded Providers, as well as any additional information that will affect the Contractor’s Provider network.

  • Consumer Price Index For purposes of this Agreement, the term “CPI” refers to the Consumer Price Index as published by the Bureau of Labor Statistics of the United States Department of Labor, U.S. City Average, All Items for Urban Wage Earners and Clerical Workers (1982-1984=100). If the CPI is hereafter converted to a different standard reference base or otherwise revised, the determination of the CPI adjustment shall be made with the use of such conversion factor, formula or table for converting the CPI, as may be published by the Bureau of Labor Statistics, or, if the bureau shall no longer publish the same, then with the use of such conversion factor, formula or table as may be published by an agency of the United States, or failing such publication, by a nationally recognized publisher of similar statistical information.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • HORIZONR Gateway HORIZONR Gateway provides customers with the ability to (i) generate reports using information maintained on the Multicurrency HORIZONR Accounting System which may be viewed or printed at the customer’s location; (ii) extract and download data from the Multicurrency HORIZONR Accounting System; and (iii) access previous day and historical data. The following information which may be accessed for these purposes: 1) holdings; 2) holdings pricing; 3) transactions, 4) open trades; 5) income; 6) general ledger and 7) cash.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Telecommunications Services Tenant will contract directly with third party providers and will be solely responsible for paying for all telephone, data transmission, video and other telecommunication services (“Telecommunication Services”) subject to the following:

  • ELECTRICAL SERVICES A. Landlord shall provide electric power for a combined load of 3.0 xxxxx per square foot of useable area for lighting and for office machines through standard receptacles for the typical office space.

Time is Money Join Law Insider Premium to draft better contracts faster.