Cloud Computing State Risk and Authorization Management Program In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.0593, Contractor acknowledges and agrees that, if providing cloud computing services for System Agency, Contractor must comply with the requirements of the state risk and authorization management program and that System Agency may not enter or renew a contract with Contractor to purchase cloud computing services for the agency that are subject to the state risk and authorization management program unless Contractor demonstrates compliance with program requirements. If providing cloud computing services for System Agency that are subject to the state risk and authorization management program, Contractor certifies it will maintain program compliance and certification throughout the term of the Contract.
Unbundled Sub-Loop Feeder 2.8.4.1 Unbundled Sub-Loop Feeder (USLF) provides connectivity between BellSouth's central office and cross-box (or other access point) that serves an end user location. 2.8.4.2 USLF utilized for voice traffic can be configured as 2-wire voice (USLF-2W/V) or 4-wire voice (USLF-4W/V). 2.8.4.3 USLF utilized for digital traffic can be configured as 2-wire ISDN (USLF-2W/I); 2-wire Copper (USLF-2W/C); 4-wire Copper (USLF-4W/C); 4-wire DS0 level loop (USLF-4W/D0); or 4-wire DS1 and ISDN (USLF-4W/DI). 2.8.4.4 USLF will provide access to both the equipment and the features in the BellSouth central office and BellSouth cross box necessary to provide a 2W or 4W communications pathway from the BellSouth central office to the BellSouth cross- box. This element will allow for the connection of Lightyear’s loop distribution elements onto BellSouth's feeder system.
Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements
Voice Grade Unbundled Copper Sub-Loop Unbundled Sub-Loop Distribution – Intrabuilding Network Cable (aka riser cable)
Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.
Reactive Power and Primary Frequency Response 9.6.1 Power Factor Design Criteria
All-Requirements Power Supply The service under which the Competitive Supplier provides all of the electrical energy, capacity, reserves, and ancillary services, transmission services, transmission and distribution losses, congestion management, and other such services or products necessary to provide firm power supply to Participating Consumers at the Point of Delivery.
Anti-Layering The Company shall not incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is both (a) subordinate or junior in right of payment to any Senior Debt and (b) senior in any respect in right of payment to the Notes. No Subsidiary Guarantor shall incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is both (a) subordinate or junior in right of payment to its Senior Debt and (b) senior in right of the Section 4.9 hereof.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Organizational Power; Authorization The execution, delivery and performance by each Loan Party of the Loan Documents to which it is a party are within such Loan Party’s organizational powers and have been duly authorized by all necessary organizational, and if required, shareholder, partner or member, action. This Agreement has been duly executed and delivered by the Borrower, and constitutes, and each other Loan Document to which any Loan Party is a party, when executed and delivered by such Loan Party, will constitute, valid and binding obligations of the Borrower or such Loan Party (as the case may be), enforceable against it in accordance with their respective terms, except as may be limited by applicable bankruptcy, insolvency, reorganization, moratorium, or similar laws affecting the enforcement of creditors’ rights generally and by general principles of equity.