Detection of DTMF signals Sample Clauses

Detection of DTMF signals. 2. Detection of MFRl, MFR2 Forwards, and MFR2 Backwards signals.
AutoNDA by SimpleDocs

Related to Detection of DTMF signals

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

  • Use of Electrical Services by Tenant Tenant's use of electrical services furnished by Landlord shall be subject to the following:

  • Security Against Unauthorized Use of Funds’ Recordkeeping Systems Financial Intermediary agrees to provide such security as is necessary to prevent any unauthorized use of the Funds’ recordkeeping system, accessed via (a) the world wide web or any URL maintained by the Funds or JPMDS, (b) a networking/data access arrangement or (c) computer hardware or software provided to Financial Intermediary by JPMDS.

  • Production of Witnesses; Records; Cooperation (a) After the Effective Time, except in the case of a Dispute between Parent and SpinCo, or any members of their respective Groups, each Party shall use its commercially reasonable efforts to make available to the other Party, upon written request, the former, current and future directors, officers, employees, other personnel and agents of the members of its respective Group as witnesses and any books, records or other documents within its control or which it otherwise has the ability to make available without undue burden, to the extent that any such person (giving consideration to business demands of such directors, officers, employees, other personnel and agents) or books, records or other documents may reasonably be required in connection with any Action in which the requesting Party (or member of its Group) may from time to time be involved, regardless of whether such Action is a matter with respect to which indemnification may be sought hereunder. The requesting Party shall bear all costs and expenses in connection therewith.

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Interruption of Use Tenant agrees that Landlord shall not be liable for damages, by abatement of Rent or otherwise, for failure to furnish or delay in furnishing any service (including telephone and telecommunication services), or for any diminution in the quality or quantity thereof, when such failure or delay or diminution is occasioned, in whole or in part, by breakage, repairs, replacements, or improvements, by any strike, lockout or other labor trouble, by inability to secure electricity, gas, water, or other fuel at the Building or Project after reasonable effort to do so, by any riot or other dangerous condition, emergency, accident or casualty whatsoever, by act or default of Tenant or other parties, or by any other cause beyond Landlord's reasonable control; and such failures or delays or diminution shall never be deemed to constitute an eviction or disturbance of Tenant's use and possession of the Premises or relieve Tenant from paying Rent or performing any of its obligations under this Lease. Furthermore, Landlord shall not be liable under any circumstances for a loss of, or injury to, property or for injury to, or interference with, Tenant's business, including, without limitation, loss of profits, however occurring, through or in connection with or incidental to a failure to furnish any of the services or utilities as set forth in this Article 6.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Data Protection During Transmission Transfer Agent shall encrypt, using an industry standard encryption algorithm, personally identifiable Fund Data when such data is transmitted.

  • Electronic Execution of Documents The words “execution,” “signed,” “signature” and words of like import in any Loan Document shall be deemed to include electronic signatures or the keeping of records in electronic form, each of which shall be of the same legal effect, validity and enforceability as a manually executed signature or the use of a paper-based recordkeeping systems, as the case may be, to the extent and as provided for in any applicable law, including, without limitation, any state law based on the Uniform Electronic Transactions Act.

Time is Money Join Law Insider Premium to draft better contracts faster.