AT&T-12STATE acknowledges that CLEC may have an embedded base of one-way trunks ordered and installed prior to the Effective Date of this Agreement that were used for termination of CLEC’s Section 251(b)(5)/IntraLATA Toll Traffic to AT&T-12STATE (Embedded Base). To the extent that CLEC has such an Embedded Base, CLEC shall only augment trunk groups in the Embedded Base with the mutual agreement of the Parties. CLEC shall not order any new one-way trunk groups following the Effective Date of this Agreement. Moreover, the Parties agree that the Embedded Base will be converted to two-way trunk groups under the following circumstances: 4.2.1.1 With reasonable notification from AT&T-12STATE and upon AT&T-12STATE’s request, CLEC shall convert all of its Embedded Base to two-way trunks. 4.2.1.2 At any time an Embedded Base trunk group (either originating or terminating) requires augmentation, AT&T-12STATE can require the associated originating and terminating trunks to be converted to a single two-way trunk group prior to the augmentation. 4.2.1.3 When any network changes are to be performed on a project basis (i.e., central office conversions, tandem re-homes, etc.), upon request and reasonable notice by AT&T-12STATE, CLEC will convert all of its Embedded Base affected by the project within the intervals and due dates required by the project parameters. 4.2.1.4 In addition to the foregoing, CLEC may choose, at any time, to convert its Embedded Base to two-way trunk groups. 4.2.1.5 The Parties will coordinate any trunk group migration, trunk group prioritization and implementation schedule. AT&T-12STATE agrees to develop a cutover plan within thirty (30) days of notification to CLEC of the need to convert pursuant to Section 4.2.1.1 above and Section 4.2.1.3 above.
Non-Medical, Personalized Services The Practice shall also provide Members with the following non-medical services:
Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.
Certification as Small Contractor or Minority Business Enterprise This paragraph was intentionally left blank.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
SBC-12STATE 47.1.1 The terms contained in this Agreement and any Appendices, Attachments, Exhibits, Schedules, and Addenda constitute the entire agreement between the Parties with respect to the subject matter hereof, superseding all prior understandings, proposals and other communications, oral or written between the Parties during the negotiations of this Agreement and through the execution and/or Effective Date of this Agreement. This Agreement shall not operate as or constitute a novation of any agreement or contract between the Parties that predates the execution and/or Effective Date of this Agreement.
Electrical Service Electrical service for new construction or a renovated existing building shall be 480/277-volt, 3-phase, 4-wire or approved equal. Service shall be sized for HVAC and other mechanical system(s) loads, lighting, general building services, and dedicated computer based office equipment loads. 5 xxxxx per square foot shall be provided for lighting and general service receptacles. Size of neutral conductor of 3- phase circuits shall be twice that of phase conductor to accommodate potential harmonic currents associated with computer system electronic power supplies and fluorescent lighting fixtures electronic ballasts.
User Generated Content 10.1 As a user to this website, You may be allowed to post any User Generated Content (“User Content”) and You agree, by submitting your contribution, you xxxxx XX Group a perpetual, royalty-free, non-exclusive, sublicensable right and license to use, reproduce, edit, modify, adapt, publish, translate, create derivate works from, distribute, perform, play, make available to the public, and exercise all copyright and publicity rights with respect to your contribution worldwide and/or to incorporate your contribution in other works in any media, now known or later developed, for the full terms of any rights that may exist in your contribution. 10.2 You also hereby grant other user of TM Website a non-exclusive license to access your User Content through the access and/or use of TM Website, and to use such User Content only as permitted through the functionality of TM Website. 10.3 You understand and agree that TM may retain and store, but not display, distribute, or perform, server copies of User Content that has been removed or deleted. The above licenses granted to TM, by You in User Content is irrevocable. 10.4 Further to the foregoing paragraph, by submitting your User Content to us, You warrant that:- (a) your User Content is your own original work or have the necessary license, rights, consents, and permissions to use and authorize us to use all patent, trademark, trade secret, copyright or other proprietary rights in and to any and all User Content to enable TM to use of the User Content in the manner required by us and that you have the right to make it available to us for all the purposes specified above; (b) your User Content is not defamatory, threatening, injurious, insulting character, offensive, abusive, offensive on moral, menacing, religious or political grounds, impair your confidentiality obligations; (c) your User Content does not infringe the law; (d) You shall be solely responsible for your own User Content and the consequences of posting or publishing them; (e) You will not submit material that is copyrighted, protected by trade secret or otherwise subject to third party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from their rightful owner to post material and to grant us all of the license rights granted herein; and/or (f) waive any moral rights in your User Content for the purposes of its submission to and publication in TM Website and the purposes specified above. 10.5 You understand that whether or not such User Content is posted, TM does not guarantee any confidentiality with respect to any User Content. TM does not endorse any User Content or any opinion, recommendation, or advice expressed therein, and expressly disclaims any and all liability in connection with User Content. We do not permit activities which will infringe any Intellectual Property Rights including copyright and we will remove all infringing contents and User Content upon notification that such Content or User Content infringes on another’s Intellectual Property Rights. We further reserve the right to remove any Content or User Content without prior notice. 10.6 You understand and agree that we may review and delete any User Content that you posted at any time without notice, without liability and for any reason whatsoever, especially if you breach the terms and conditions herein. 10.7 We reserve the right to investigate and take appropriate legal action, in our sole discretion, against You for the User Content especially if it violates TM policy and report you to the Appropriate Authority.
USER GENERATED CONTRIBUTIONS The Licensed Application may invite you to chat, contribute to, or participate in blogs, message boards, online forums, and other functionality, and may provide you with the opportunity to create, submit, post, display, transmit, perform, publish, distribute, or broadcast content and materials to us or in the Licensed Application, including but not limited to text, writings, video, audio, photographs, graphics, comments, suggestions, or personal information or other material (collectively, "Contributions"). Contributions may be viewable by other users of the Licensed Application and through third-party websites or applications. As such, any Contributions you transmit may be treated as non-confidential and non-proprietary. When you create or make available any Contributions, you thereby represent and warrant that: 1. The creation, distribution, transmission, public display, or performance, and the accessing, downloading, or copying of your Contributions do not and will not infringe the proprietary rights, including but not limited to the copyright, patent, trademark, trade secret, or moral rights of any third party. 2. You are the creator and owner of or have the necessary licenses, rights, consents, releases, and permissions to use and to authorize us, the Licensed Application, and other users of the Licensed Application to use your Contributions in any manner contemplated by the Licensed Application and this License Agreement. 3. You have the written consent, release, and/or permission of each and every identifiable individual person in your Contributions to use the name or likeness or each and every such identifiable individual person to enable inclusion and use of your Contributions in any manner contemplated by the Licensed Application and this License Agreement. 4. Your Contributions are not false, inaccurate, or misleading. 5. Your Contributions are not unsolicited or unauthorized advertising, promotional materials, pyramid schemes, chain letters, spam, mass mailings, or other forms of solicitation. 6. Your Contributions are not obscene, lewd, lascivious, filthy, violent, harassing, libelous, slanderous, or otherwise objectionable (as determined by us). 7. Your Contributions do not ridicule, mock, disparage, intimidate, or abuse anyone. 8. Your Contributions are not used to harass or threaten (in the legal sense of those terms) any other person and to promote violence against a specific person or class of people. 9. Your Contributions do not violate any applicable law, regulation, or rule. 10. Your Contributions do not violate the privacy or publicity rights of any third party. 11. Your Contributions do not violate any applicable law concerning child pornography, or otherwise intended to protect the health or well-being of minors. 12. Your Contributions do not include any offensive comments that are connected to race, national origin, gender, sexual preference, or physical handicap. 13. Your Contributions do not otherwise violate, or link to material that violates, any provision of this License Agreement, or any applicable law or regulation. Any use of the Licensed Application in violation of the foregoing violates this License Agreement and may result in, among other things, termination or suspension of your rights to use the Licensed Application.
Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.