Indirect Access Sample Clauses

Indirect Access. (a) The MOU provides that generally, Newco is responsible for access services, and Indirect Access is a part of access services. FT has however committed to assume responsibility for certain activities and the supply of certain technical features. (b) FT shall be responsible for the signaling, numbering plan, day to day capacity planning, monitoring and trouble shooting procedures relating to Indirect Access. (c) FT will be responsible for directing and managing all negotiations with PTOs for Newco for Indirect Access to and will exercise best efforts to have all necessary agreements in place for Indirect Access. (d) FT shall be responsible for development and implementation of technical solutions necessary to ensure regulatory compliance for existing and future Switched Voice Services (including number portability).
AutoNDA by SimpleDocs
Indirect Access. All parties will take measures to prevent unauthorized third-party indirect access to the shared Xxxxxxxx Flex System. Examples of this would be gateways, dial-up, or cascaded Telnet sessions where the originator is not an Authorized Individual of the Server Site’s network, but whose resultant IP address would appear to the network as being an Authorized Individual’s address. Should unauthorized access occur in a manner prohibited in Section 1.4 occur, any damages or costs of litigation including attorney’s fees incurred as a result of such unauthorized access shall be allocated between the parties by the Standards Committee.
Indirect Access. In the event Enrolled Affiliate incurs fees created by instances of indirect access to on-premises Microsoft Server products which the Enrolled Affiliate had no actual knowledge of, Microsoft will work with Government Partner and the Enrolled Affiliate in good faith to determine how to mitigate such fees. Reorganizations, Consolidations, and Privatizations. If the number of Licenses covered by an Enrollment changes by more than ten percent as a result of a reorganization, consolidation, or privatization of any member of the Enterprise, Microsoft will work with Government Partner in good faith to determine how to accommodate the Enterprise’s changed circumstances in the context of these Additional Use Rights and Restrictions. Modification or termination of an Online Service for regulatory reasons. Microsoft may modify or terminate an Online Service in any country or jurisdiction where there is any current or future government requirement or obligation that: (1) subjects Microsoft to any regulation or requirement not generally applicable to businesses operating there; (2) presents a hardship for Microsoft to continue operating the Online Service without modification; and/or (3) causes Microsoft to believe these terms or the Online Service may be in conflict with any such requirement or obligation. Program updates. Microsoft may make a change to the Enterprise and/or Enterprise Subscription programs that will make it necessary for Enrolled Affiliates to enter into a new agreement and Enrollments with Government Partner at the time of an Enrollment renewal. If any such updates occur during a current contract, including option periods, such change(s) will be made at no increase in cost to Enrolled Affiliate: all pricing in the current contract, including contract options will be honored despite any such change(s).
Indirect Access. For indirect access, a directly connected customer of Operator B would use a specific Access Code to access Operator A. Operator B will implement Data Management Amendments into their network so that whenever the code is dialled, it will be recognised and the Call forwarded immediately to the Operator A network, via the nearest point of handover or such other point as is agreed under agreed routing principles. Operator A will pay Operator B for the originating part of the Call. Indirect Access is an optional access method for the end customer. If an Access Code is not used, the Call will be routed via the operator serving that customer (i.e. providing the physical connection). Two variations of this service can be implemented. The first - using ‘A’ number presentation (or Calling Line Identification), where the Caller can instantly be identified as an Operator A customer, and the Call validated. The other type relies on two stage Call set up, where the Caller will be required to enter a Personal Identification Number, which will be validated by Operator A.
Indirect Access. 5.1 The Client shall permit 4SIGHT to attend the Client’s Site to provide any Work Order Services which require physical access, including applicable support and maintenance Services and/or to programme least cost routing into the Client's telephone system to allow access to the Carrier's telephone network. 5.2 The Client shall be responsible for ensuring that the Client’s Equipment maintenance is not jeopardised in any way as a result of requesting and/or receiving the Work Order Services.
Indirect Access. Indirect Access occurs when humans, devices or systems indirectly access or use the software via another intermediary software or Application Programming Interface (API) between the user and the Licensor’s software. Licenses will not be required for: a. One-way or two-way access for read-only, write-only or read-and write transactions. b. Real time, batch transactions or indirect static reads. c. Accessing the Licensor’s software through one or more intermediary systems, custom front end application or access via other technical interface. d. Accessing the Licensor’s software via a third-party application or custom front end application that that may or may not activate the Licensor’s software.

Related to Indirect Access

  • Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.

  • Market Access 1. With respect to market access through the modes of supply identified in the "trade in services" definition of Article 104 (Definitions), each Party shall accord to services and service suppliers of the other Party treatment no less favourable than that provided for under the terms, limitations and conditions agreed and specified in its Schedule (7). 2. In sectors where market access commitments are undertaken, the measures which a Party shall not maintain or adopt either on the basis of a regional subdivision or on the basis of its entire territory, unless otherwise specified in its Schedule, are defined as: (a) limitations on the number of service suppliers whether in the form of numerical quotas, monopolies, exclusive service suppliers or the requirements of an economic needs test; (b) limitations on the total value of service transactions or assets in the form of numerical quotas or the requirement of an economic needs test; (c) limitations on the total number of service operations or on the total quantity of service output expressed in terms of designated numerical units in the form of quotas or the requirement of an economic needs test; (8) (d) limitations on the total number of natural persons that may be employed in a particular service sector or that a service supplier may employ and who are necessary for, and directly related to, the supply of a specific service in the form of numerical quotas or the requirement of an economic needs test; (e) measures which restrict or require specific types of legal entity or joint venture through which a service supplier may supply a service; or (f) limitations on the participation of foreign capital in terms of maximum percentage limit on foreign shareholding or the total value of individual or aggregate foreign investment.

  • Account Access Electronic Check Transactions may only be made from your checking account.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Service Access Access to the clinical parts of our Site is restricted to Users. Users of our Site are provided with unique User IDs by the Clinic with which they are associated and must choose a password of their choice to sign on to our Site. Users must provide personal contact information, and you must ensure that your information is kept up to date at all times. User IDs and passwords constitute an electronic signature and will be used by us to authenticate access to our Site. If a User opts to sign onto Xxxxxx.xxx, the User will be able to take advantage of the non- public sections of our Site. If a User opts not to sign onto our Site, their access to our Site will be restricted to the public sections of our Site only. If you are provided with a User ID, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any third party. We have the right to disable any User ID at any time, if in our opinion, you have failed to comply with any of the provisions of this Agreement. You may only use our Site as set out in this Agreement. Any illegal or unauthorized use of our Site shall constitute a violation of this Agreement. You do not have permission to access our Site in any way that violates this Agreement or breaches any applicable law. You agree to keep your and your Patients’ Data accurate, current and complete. You may print off or download extracts of page(s) from our Site for your use in Patient care or insertion into a Patient’s electronic health records only.

  • Telephone Access Employees shall be entitled to reasonable use of the client's telephone for local calls during the evening to speak with family members (i.e., spouse, children, dependants, parents). Employees may not receive personal calls on the client's telephone nor give out the client's telephone number. In the case of urgent personal calls to the employee, messages will be taken by the Employer and passed on to the employee as soon as possible. In the event of an emergency, the employee shall use the client's telephone to contact the appropriate authorities or the contact person designated by the Employer.

  • Parent Access To the extent required by law the LEA shall establish reasonable procedures by which a parent, legal guardian, or eligible student may review Education Records and/or Student Data correct erroneous information, and procedures for the transfer of student-generated content to a personal account, consistent with the functionality of services. Provider shall respond in a reasonably timely manner (and no later than forty five (45) days from the date of the request or pursuant to the time frame required under state law for an LEA to respond to a parent or student, whichever is sooner) to the LEA’s request for Student Data in a student’s records held by the Provider to view or correct as necessary. In the event that a parent of a student or other individual contacts the Provider to review any of the Student Data accessed pursuant to the Services, the Provider shall refer the parent or individual to the LEA, who will follow the necessary and proper procedures regarding the requested information.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!