Limits of interactive Tools Sample Clauses

Limits of interactive Tools. Our Services may feature certain interactive analysis, calculators, tools, estimates, projections, target figures, or valuations relating to real properties or investments (collectively, “Tools”). These tools are based upon data obtained from various sources. Although we believe this data to be accurate, some data has been obtained from public or third-party sources and has not been independently verified by us. Other data is based upon or drawn from projections or assumptions that may, or may not, prove to be accurate. These Tools are provided for your informational purposes only and should not be relied upon when making an investment decision. You acknowledge that the estimates, projections, target figures, or valuations provided by these Tools: (a) represent only one approach to arrive at an estimate based upon available data and assumptions and that there may be other, more accurate approaches; and (b) do not constitute a warranty or guarantee of price, performance, or outcomes and cannot be relied upon as such. The information provided by these Tools is provided on an “as is, as available” basis with all faults and defects.
AutoNDA by SimpleDocs

Related to Limits of interactive Tools

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Functionality Customer is entitled to additional functionality previously purchased or bundled with the software if available in the version or update released on or after the start date of the Agreement. Customer acknowledges that certain functionality in current and previous software versions may not be available in future upgrades. Added functionality may require additional paid services (clinical and technical) to configure and support.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Points of Interconnection As and to the extent required by Section 251 of the Act, the Parties shall provide Interconnection of their networks at any technically feasible point as described in Section 4.3. To the extent the originating Party’s POI is not located at the terminating Party’s relevant IP, the originating Party is responsible for transporting its traffic from it’s POI to the terminating Party’s relevant IP.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Methods of Interconnection The Parties will negotiate the facilities arrangement used to interconnect their respective networks. CLEC shall establish at least one (1) physical Point of Interconnection in CenturyLink territory in each LATA CLEC has local End User Customers. CLEC represents and warrants that it is serving End User Customers physically located within each local calling area for which it wishes to exchange traffic within CenturyLink territory. The Parties shall establish, through negotiations, at least one (1) of the following Interconnection arrangements, at any Technically Feasible point: (1) a DS1 or DS3 CenturyLink-provided facility; (2) Collocation; (3) negotiated Mid-Span Meet POI facilities; or (4) other Technically Feasible methods of Interconnection via the Bona Fide Request (BFR) process unless a particular arrangement has been previously provided to a third party, or is offered by CenturyLink as a product.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Programming Phase 2.2.1.2. Schematic Design Phase: 2.2.1.3. Design Development Phase:

Time is Money Join Law Insider Premium to draft better contracts faster.