General OSS Policies Sample Clauses

General OSS Policies. 37.3.1 Due to enhancements and on-going development of access to SBC- ASI/13State’s OSS functions, certain interfaces described in this Agreement may be modified, temporarily unavailable or may be phased out after execution of this Agreement. 37.3.2 Each Party’s resources are for approved business purposes only.
AutoNDA by SimpleDocs
General OSS Policies. Due to enhancements and on-going development of access to ASI-North’s OSS functions, certain interfaces described in this Agreement may be modified, temporarily unavailable or may be phased out after execution of this Agreement. Each Party’s resources are for approved business purposes only. Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its own systems, and take appropriate action should unauthorized or improper usage be discovered. Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. Authorized users must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other. User Identification. Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions. User identification shall be accomplished by the assignment of a unique, permanent user ID, and each user ID shall have an associated identification number for security purposes. User Authentication. Users will usually be authenticated by use of a password. Strong authentication methods (e.g. one-time passwords, digital signatures, etc.) may be required in the future. Passwords must not be stored in script files. Passwords must be entered by the user in real time. Personal passwords must not be shared. A user who has shared his password is responsible for any use made of the password.
General OSS Policies. (1) Due to enhancements and on-going development of access to SBC-ASI/8- State's OSS functions, certain interfaces described in this Agreement may be modified, temporarily unavailable or may be phased out after execution of this Agreement. (2) Each Party's resources are for approved business purposes only. (3) Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its own systems, and take appropriate action should unauthorized or improper usage be discovered. (4) Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. (5) Authorized users must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. (6) Actual or suspected unauthorized access events must be reported immediately to each Party's security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.
General OSS Policies. 40.3.1 Due to enhancements and on-going development of access to SBC-ASI/13State’s OSS functions, certain interfaces described in this Agreement may be modified, temporarily unavailable or may be phased out after execution of this Agreement. 40.3.2 Each Party’s resources are for approved business purposes only. 40.3.3 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its own systems, and take appropriate action should unauthorized or improper usage be discovered. 40.3.4 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 40.3.5 Authorized users must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 40.3.6 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Related to General OSS Policies

  • General Policies 6.2.4.1 Each Party’s resources are for approved business purposes only. 6.2.4.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 6.2.4.3 Individuals will only be given access to resources that they are authorized to receive, and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 6.2.4.4 Authorized users must not develop, copy or use any program or code that circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 6.2.4.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

  • Your General Obligations 6.1 Full information You must give us any information we reasonably require for the purposes of this contract. The information must be correct, and you must not mislead or deceive us in relation to any information provided to us. 6.2 Updating information You must tell us promptly if information you have provided to us changes, including if your billing address changes or if your use of energy changes (for example, if you start running a business at the premises).

  • General Operations Tenant covenants and agrees to furnish to Landlord, within thirty (30) days after receipt or modification thereof, copies of: (a) all licenses authorizing Tenant or any Manager to operate any Facility for its Primary Intended Use; (b) all Medicare and Medicaid certifications, together with provider agreements and all material correspondence relating thereto with respect to any Facility (excluding, however, correspondence which may be subject to any attorney client privilege); (c) if required under Applicable Law with respect to any Facility, a license for each individual employed as administrator with respect to such Facility; (d) all reports of surveys, statements of deficiencies, plans of correction, and all material correspondence relating thereto, including, without limitation, all reports and material correspondence concerning compliance with or enforcement of licensure, Medicare/Medicaid, and accreditation requirements, including physical environment and Life Safety Code survey reports (excluding, however, correspondence which may be subject to any attorney client privilege); and (e) with reasonable promptness, such other confirmation as to the licensure and Medicare and Medicaid participation of Tenant as Landlord may reasonably request from time to time.

  • General Overview 2.1.1 If DTI requires maintenance for its local service customers, DTI will initiate a request for repair (sometimes referred to as a "trouble report") by calling GTE's Customer Care Repair Center. During this call, GTE service representatives will verify that the end-user is DTI customer and will then obtain the necessary information from DTI to process the trouble report. While DTI representatives are still on the line, GTE personnel will perform an initial analysis of the problem and remote line testing for resale services. If engineered services are involved, the call will be made to the GTE SSCC for handling. If no engineering is required and the line testing reveals that the trouble can be repaired remotely, GTE personnel will correct the problem and close the trouble report while DTI representatives are still on the line. If on-line resolution is not possible, GTE personnel will provide DTI representatives a commitment time for repair, and the GTE personnel then will enter the trouble ticket into the GTE service dispatch queue. DTI's repair service commitment times will be within the same intervals as GTE provides to its own end users. Maintenance and repair of GTE facilities is the responsibility of GTE and will be performed at no incremental charge to DTI. If, as a result of DTI-initiated trouble report, trouble is found to be the responsibility of DTI (e.g., non-network cause) GTE will charge DTI for trouble isolation. DTI will have the ability to report trouble for its end users to appropriate trouble reporting centers 24 hours a day, 7 days a week. DTI will be assigned a customer contact center when initial service agreements are made.

  • Rules and Policies In addition to the terms and conditions contained herein, players acknowledge and agree that players shall be bound by and comply with all rules, regulations and policies established by SGM. SGM reserves the right in its sole and absolute discretion to amend,

  • Compliance with Rules and Policies The Executive shall perform all services in accordance with the lawful policies, procedures and rules established by the Company and the Board. In addition, the Executive shall comply with all laws, rules and regulations that are generally applicable to the Company or its subsidiaries and their respective employees, directors and officers.

  • General Policy Our policy is to make funds from your cash and check deposits available to you on the next business day after we receive your deposit. Electronic direct deposits will be available on the day we receive the deposit. Once they are available, you can withdraw the funds in cash and we will use the funds to pay checks that you have written. For determining the availability of your deposits, every day is a business day, except Saturdays, Sundays, and federal holidays. If you make a deposit before 6:00 p.m. within our facilities or through our ATM on a business day that we are open, we will consider that day to be the day of your deposit. However, if you make a deposit after 6:00 p.m. through our ATM or on a day we are not open, we will consider that the deposit was made on the next business day we are open.

  • Umbrella Policies Contractor may satisfy basic coverage limits through any combination of basic coverage and umbrella insurance.

  • General Obligations 1. Each Party shall apply its measures relating to the provisions of this Chapter in accordance with Article 116 (General Principles) and, in particular, shall expeditiously apply those measures so as to avoid unduly impairing or delaying trade in goods or services or conduct of investment activities under this Agreement. 2. Nothing in this Chapter shall be construed to prevent a Party from applying measures to regulate the entry of natural persons into, or their temporary stay in, its territory, including those measures necessary to protect the integrity of, and to ensure the orderly movement of natural persons across, its borders, provided that such measures are not applied in such a manner as to unduly impair or delay trade in goods or services or conduct of investment activities under this Agreement.

  • Rules, Regulations and Policies Employee shall abide by and comply with all of the rules, regulations, and policies of Employer, including without limitation Employer's policy of strict adherence to, and compliance with, any and all requirements of the banking, securities, and antitrust laws and regulations.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!