Local Access Service Sample Clauses

Local Access Service. F+E IA Packages must utilize Local Access Service provided by CenturyLink. The Local Access MRC is included in the Package MRC. The NRC will apply to the initial installation of F+E IA Packages, including standard Local Access NRCs, but does not apply to any special construction fees or other ancillary local access charges (including but not limited to expedite charges, change charges and any charges other than standard local access NRCs). If required at Customer’s location, CenturyLink will provide Extended Wiring at no additional charge. For purposes of these F+E IA Package Provisions, Extended Wiring under the Local Access Service-specific provisions will include Ethernet Local Access. Except as otherwise set forth in these F+E IA Package Provisions, all other pricing for Local Access Service, including but not limited to special construction and ancillary local access charges, will continue to apply and is not discounted.
AutoNDA by SimpleDocs
Local Access Service. F+E SIP IAD Packages must utilize a Local Access Service provided by CenturyLink. The MRC for Local Access Service is included in the F+E SIP IAD Package MRC. The NRC shown on the Summary Page will apply to the initial installation of F+E IA Packages, including standard Local Access NRCs, but does not apply to any special construction fees or other ancillary local access charges (including but not limited to expedite charges, change charges and any charges other than standard local access NRCs). If required at Customer’s location, CenturyLink will provide Extended Wiring at no additional charge. For purposes of these F+E SIP IAD Package Provisions, Extended Wiring under the Local Access Service-specific provisions will include Ethernet Local Access.

Related to Local Access Service

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Switched Exchange Access Service The offering of transmission and switching services for the purpose of the origination or termination of Toll Traffic. Switched Exchange Access Services include but may not be limited to: Feature Group A, Feature Group B, Feature Group D, 700 access, 800 access, 888 access and 900 access.

  • Special Access Service Conversions 5.3.6.1 IDS may not convert special access services to combinations of loop and transport network elements, whether or not IDS self-provides its entrance facilities (or obtains entrance facilities from a third party), unless IDS uses the combination to provide a significant amount of local exchange service, in addition to exchange access service, to a particular customer. To the extent IDS requests to convert any special access services to combinations of loop and transport network elements at UNE prices, IDS shall provide to BellSouth a letter certifying that IDS is providing a significant amount of local exchange service (as described in this Section) over such combinations. The certification letter shall also indicate under what local usage option IDS seeks to qualify for conversion of special access circuits. IDS shall be deemed to be providing a significant amount of local exchange service over such combinations if one of the following options is met:

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Verizon OSS Services Access to Verizon Operations Support Systems functions. The term “Verizon OSS Services” includes, but is not limited to: (a) Verizon’s provision of Z-Tel Usage Information to Z-Tel pursuant to Section 8.1.3 below; and, (b) “Verizon OSS Information”, as defined in Section 8.1.4 below.

  • Local Control Center, Metering and Telemetry The NTO shall operate, pursuant to ISO Tariffs, ISO Procedures, Reliability Rules and all other applicable reliability rules, standards and criteria on a twenty-four (24) hour basis, a suitable local control center(s) with all equipment and facilities reasonably required for the ISO to exercise ISO Operational Control over NTO Transmission Facilities Under ISO Operational Control, and for the NTO to fulfill its responsibilities under this Agreement. Operation of the NYS Power System is a cooperative effort coordinated by the ISO control center in conjunction with local control centers and will require the exchange of all reasonably necessary information. The NTO shall provide the ISO with Supervisory Control and Data Acquisition (“SCADA”) information on facilities listed in Appendices A-1 and A-2 herein as well as on generation and merchant transmission resources interconnected to the NTO’s transmission facilities pursuant to the ISO OATT. The NTO shall provide metering data for its transmission facilities to the ISO, unless other parties are authorized by the appropriate regulatory authority to provide metering data. The NTO shall collect and submit to the ISO billing quality metering data and any other information for its transmission facilities required by the ISO for billing purposes. The NTO shall provide to the ISO the telemetry and other operating data from generation and merchant transmission resources interconnected to its transmission facilities that the ISO requires for the operation of the NYS Power System. The NTO will establish and maintain a strict code of conduct to prevent such information from reaching any unauthorized person or entity.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Network Resource Interconnection Service (check if selected)

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

Time is Money Join Law Insider Premium to draft better contracts faster.