Control of Programming Sample Clauses

Control of Programming. (i) Subject to the terms and conditions of the Agreement, including without limitation the warranties in Section 8 of the Agreement, Company will exclusively manage, refresh, create, delete, edit and otherwise control any and all aspects of the Programming on MobiTV, except in the case of T-Mobile-Branded MobiTV as provided herein. (ii) T-Mobile will have final approval rights over the Programming licensed by Company and made available to Subscribers via the T-Mobile-Branded MobiTV. T-Mobile may propose any additions, removals or reordering of such Programming and, subject to third party content rights availability, Company’s contractual obligations to the third party Programming providers, third party content license fees, and Company’s provisioning costs (e.g., encoding and video delivery infrastructure), Company will comply with such requests. In the event that any Programming is in violation of Section 8.1(iii) of the Agreement, upon notice by T-Mobile or Company’s knowledge of such fact, Company will, subject to compliance with any contractual obligations to its third party Programming providers, remove such Programming as soon as commercially possible, which will in any event be less than forty-eight (48) hours. (iii) T-Mobile-Branded MobiTV and Company-branded versions of MobiTV that are preloaded on tablets will include ongoing Free Content from categories, which may include, without limitation, news, sports, kids, seasonal, weather, comedy and Spanish language and may change from time to time. (iv) If T-Mobile desires to make Programming from any source other than Company available to Subscribers via T-Mobile-Branded MobiTV, the parties will negotiate in good faith the terms under which such Programming will be included within T-Mobile-Branded MobiTV and will amend the Agreement to provide for such Programming.
AutoNDA by SimpleDocs
Control of Programming. Programmer acknowledges and agrees that Paxsxx, xx licensee of the Station and the other stations that comprise the Network, is required by the FCC to control the operation of the Station and such other Network stations, and that such control includes, but is not limited to, the right to reject or refuse to broadcast all or such portions of the Programmer's Christian programming which Paxsxx xxxieves to be contrary to the public interest. Programmer also acknowledges Paxsxx'x xxxigations under the Communications Act of 1934, as amended, and the rules, regulations and policies of the FCC to broadcast from time to time programming of local or national importance, and Programmer agrees that Paxsxx xxxll have the right to approve the content of Programmer's Christian programming and any commercial matter and to refuse to broadcast or preempt Programmer's Christian programming to broadcast programming of greater local or national importance or to broadcast such other programming required by the rules and regulations of the FCC.

Related to Control of Programming

  • Control of the Contract F1 Transfer and Sub-Contracting F1.1 Except where F1.4 and F1.5 applies, the Contractor shall not assign, sub-contract or in any other way dispose of the Contract or any part of it without prior Approval. Sub-contracting any part of the Contract shall not relieve the Contractor of any of its obligations or duties under the Contract. F1.2 The Contractor shall be responsible for the acts and omissions of its Sub-contractors as though they are its own. F1.3 Where the Authority has consented to the placing of sub-contracts, copies of each sub-contract shall, at the request of the Authority, be sent by the Contractor to the Authority as soon as reasonably practicable. F1.4 Notwithstanding clause F1.1, the Contractor may assign to a third party (“the Assignee”) the right to receive payment of the Contract Price or any part thereof due to the Contractor under this Contract (including any interest which the Authority incurs under clause C2.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Control of Other Party’s Business Nothing contained in this Agreement shall give the Company, directly or indirectly, the right to control or direct Parent's operations prior to the Effective Time. Nothing contained in this Agreement shall give Parent, directly or indirectly, the right to control or direct the Company's operations prior to the Effective Time. Prior to the Effective Time, each of the Company and Parent shall exercise, consistent with the terms and conditions of this Agreement, complete control and supervision over its respective operations.

  • Internet Connection Certain Solutions may require an active and stable connection to the Internet in order to function. It is therefore your responsibility to ensure that you have at all times an active and stable Internet connection.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Transmission and Routing of Telephone Exchange Service Traffic 50.4.1 The Appendix Reciprocal Compensation, which is/are attached hereto and incorporated herein by reference, prescribe traffic routing parameters for Local Interconnection Trunk Group(s) the Parties shall establish over the Interconnections specified in the Appendix ITR, which is/are attached hereto and incorporated herein by reference.

  • Control of Defense At its option, the indemnifying Party may assume the defense of any Third Party Claim by giving written notice to the Indemnified Party within thirty (30) days after the indemnifying Party's receipt of an Indemnification Claim Notice. The assumption of the defense of a Third Party Claim by the indemnifying Party shall not be construed as an acknowledgment that the indemnifying Party is liable to indemnify any indemnified Party in respect of the Third Party Claim, nor shall it constitute a waiver by the indemnifying Party of any defenses it may assert against any indemnified Party's claim for indemnification. Upon assuming the defense of a Third Party Claim, the indemnifying Party may appoint as lead counsel in the defense of the Third Party Claim any legal counsel selected by the indemnifying Party. In the event the indemnifying Party assumes the defense of a Third Party Claim, the Indemnified Party shall immediately deliver to the indemnifying Party all original notices and documents (including court papers) received by any indemnified Party in connection with the Third Party Claim. Should the indemnifying Party assume the defense of a Third Party Claim, the indemnifying Party shall not be liable to the Indemnified Party or any other indemnified Party for any legal expenses subsequently incurred by such indemnified Party in connection with the analysis, defense or settlement of the Third Party Claim. In the event that it is ultimately determined that the indemnifying Party is not obligated to indemnify, defend or hold harmless an Indemnified Party from and against the Third Party Claim, the Indemnified Party shall reimburse the indemnifying Party for any and all costs and expenses (including attorneys' fees and costs of suit) and any Losses incurred by the indemnifying Party in its defense of the Third Party Claim with respect to such Indemnified Party.

  • No Control of Other Party’s Business Nothing contained in this Agreement shall give Parent, directly or indirectly, the right to control or direct the Company’s or its Subsidiaries’ operations prior to the Effective Time, and nothing contained in this Agreement shall give the Company, directly or indirectly, the right to control or direct Parent’s or its Subsidiaries’ operations prior to the Effective Time. Prior to the Effective Time, each of the Company and Parent shall exercise, consistent with the terms and conditions of this Agreement, complete control and supervision over its and its Subsidiaries’ respective operations.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to Z-Tel for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers. 3.2 Except as otherwise required by Applicable Law, subject to Section 3.1, Verizon shall have the right to add, modify, grandfather, discontinue or withdraw, Verizon Telecommunications Services at any time, without the consent of Z-Tel. 3.3 To the extent required by Applicable Law, the Verizon Telecommunications Services to be provided to Z-Tel for resale pursuant to this Attachment will include a Verizon Telecommunications Service customer-specific contract service arrangement (“CSA”) (such as a customer specific pricing arrangement or individual case based pricing arrangement) that Verizon is providing to a Verizon Customer at the time the CSA is requested by Z-Tel.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!