System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.
Limited Operation If any of the Connecting Transmission Owner’s Attachment Facilities or System Upgrade Facilities or System Deliverability Upgrades are not reasonably expected to be completed prior to the Commercial Operation Date of the Developer’s Large Generating Facility, NYISO shall, upon the request and at the expense of Developer, in conjunction with the Connecting Transmission Owner, perform operating studies on a timely basis to determine the extent to which the Developer’s Large Generating Facility and the Developer’s Attachment Facilities may operate prior to the completion of the Connecting Transmission Owner’s Attachment Facilities or System Upgrade Facilities or System Deliverability Upgrades consistent with Applicable Laws and Regulations, Applicable Reliability Standards, Good Utility Practice, and this Agreement. Connecting Transmission Owner and NYISO shall permit Developer to operate the Developer’s Large Generating Facility and the Developer’s Attachment Facilities in accordance with the results of such studies.
Wire Unbundled DS1 Digital Loop This is a designed 4-wire Loop that is provisioned according to industry standards for DS1 or Primary Rate ISDN services and will come standard with a test point, OC, and a DLR. A DS1 Loop may be provisioned over a variety of loop transmission technologies including copper, HDSL-based technology or fiber optic transport systems. It will include a 4-Wire DS1 Network Interface at the End User’s location.
VOETSTOOTS The PROPERTY is sold: 8.1. Voetstoots in accordance with the Sectional Plan and the participation quota endorsed thereon with the opening of the Sectional Title Register, or as they are endorsed already, and any amendments or adjustments thereto from time to time in accordance with the terms of the Act and without any warranties express or implied, the SELLER shall not be liable for any patent or latent defects. Should the extent of the Section or of the PROPERTY differ from that which is contained in the title deed or sectional plan or any amendment thereto, the SELLER shall not be liable for any shortfall or be entitled to any compensation for any surplus. 8.2. Subject to all the conditions and Regulations of the Act. 8.3. The PURCHASER acknowledges that this is not a construction contract and that he is purchasing a completed unit. The PURCHASER shall not have the right to interfere in any way with the building operations of the SELLER’S employees. He shall also have no right to retention. This Clause is also applicable in the case of the bank holding back any retention amount out of its own accord or on request of the PURCHASER. 8.4. The SELLER undertakes to erect the unit according to the general building standards as set by Financial Institutions. The unit is be registered with the NHBRC. 8.5. Should a dispute arise or be declared, such dispute shall be resolved by an Arbitrator appointed by the Developer. The costs in respect thereof shall be borne by the unsuccessful party. Pending the outcome of the dispute, the PURCHASER shall be obliged to pay the outstanding amount to the Conveyancers who shall hold it in trust.
Limited Liability Company Agreement The Member hereby states that except as otherwise provided by the Act or the Certificate of Formation, the Company shall be operated subject to the terms and conditions of this Agreement.
SBC-12STATE 47.1.1 The terms contained in this Agreement and any Appendices, Attachments, Exhibits, Schedules, and Addenda constitute the entire agreement between the Parties with respect to the subject matter hereof, superseding all prior understandings, proposals and other communications, oral or written between the Parties during the negotiations of this Agreement and through the execution and/or Effective Date of this Agreement. This Agreement shall not operate as or constitute a novation of any agreement or contract between the Parties that predates the execution and/or Effective Date of this Agreement.
Gross Beta Flags A = Result acceptable, Bias <= +/- 50% with a statistically positive result at two standard deviations (Result/Uncertainty > 2, i.e., the range encompassing the result, plus or minus the total uncertainty at two standard deviations, does not include zero). N = Result not acceptable, Bias > +/- 50% or the reported result is not statistically positive at two standard deviations (Result/Uncertainty <= 2, i.e., the range encompassing the result, plus or minus the total uncertainty at two standard deviations, includes zero).
Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.
AT&T-12STATE acknowledges that CLEC may have an embedded base of one-way trunks ordered and installed prior to the Effective Date of this Agreement that were used for termination of CLEC’s Section 251(b)(5)/IntraLATA Toll Traffic to AT&T-12STATE (Embedded Base). To the extent that CLEC has such an Embedded Base, CLEC shall only augment trunk groups in the Embedded Base with the mutual agreement of the Parties. CLEC shall not order any new one-way trunk groups following the Effective Date of this Agreement. Moreover, the Parties agree that the Embedded Base will be converted to two-way trunk groups under the following circumstances: 4.2.1.1 With reasonable notification from AT&T-12STATE and upon AT&T-12STATE’s request, CLEC shall convert all of its Embedded Base to two-way trunks. 4.2.1.2 At any time an Embedded Base trunk group (either originating or terminating) requires augmentation, AT&T-12STATE can require the associated originating and terminating trunks to be converted to a single two-way trunk group prior to the augmentation. 4.2.1.3 When any network changes are to be performed on a project basis (i.e., central office conversions, tandem re-homes, etc.), upon request and reasonable notice by AT&T-12STATE, CLEC will convert all of its Embedded Base affected by the project within the intervals and due dates required by the project parameters. 4.2.1.4 In addition to the foregoing, CLEC may choose, at any time, to convert its Embedded Base to two-way trunk groups. 4.2.1.5 The Parties will coordinate any trunk group migration, trunk group prioritization and implementation schedule. AT&T-12STATE agrees to develop a cutover plan within thirty (30) days of notification to CLEC of the need to convert pursuant to Section 4.2.1.1 above and Section 4.2.1.3 above.
US-Behörden Die Apple-Software und die zugehörige Dokumentation gelten als „Commercial Items“ gemäß Definition im 48 C.F.R. §2.101, bestehend aus „Commercial Computer Software“ und