Loop Makeup Information and Ordering Sample Clauses

Loop Makeup Information and Ordering. At the CLEC’s request, AT&T will provide CLEC with nondiscriminatory access to its Loop makeup information as it exists in AT&T’s database and records via: a mechanized Loop makeup for near real-time access to data available electronically; or manual Loop makeup for information that may not be available electronically.
AutoNDA by SimpleDocs
Loop Makeup Information and Ordering. AT&T MICHIGAN will provide Climax with nondiscriminatory access to its loop makeup information set forth originally in AT&T MICHIGAN’s Advanced Service OSS Plan of Record via: (i) a mechanized loop qualification for real-time access to data available electronically in AT&T MICHIGAN’s databases; or (ii) manual loop qualification for information not available electronically (which will carry an interval of 3-5 business days or the interval provided to AT&T MICHIGAN’s advanced services affiliate). Climax will be given nondiscriminatory access to the same loop makeup information that AT&T MICHIGAN is providing to any other Climax, AT&T MICHIGAN’s retail operations and/or its advanced services affiliate. AT&T MICHIGAN’s uniform GUI and application to application OSS interfaces allow Climax, AT&T MICHIGAN’s retail operations and/or its advanced services affiliate, to have real time electronic access as a preordering function to the loop makeup information.
Loop Makeup Information and Ordering. At the CLEC’s request, AT&T-21STATE will provide CLEC with nondiscriminatory access to its Loop makeup information as it exists in AT&T-21STATE’s database and records via:
Loop Makeup Information and Ordering. SBC-12STATE will provide CLEC with nondiscriminatory access to its loop makeup information set forth originally in SBC-12STATE’s Advanced Service OSS Plan of Record via: (i) a mechanized loop qualification for real-time access to data available electronically in SBC-12STATE’s databases; or (ii) manual loop qualification for information not available electronically (which will carry an interval of 3-5 business days or the interval provided to SBC-12STATE’s advanced services affiliate in that state). CLEC will be given nondiscriminatory access to the same loop makeup information that SBC-12STATE is providing to any other CLEC, SBC-12STATE’s retail operations and/or its advanced services affiliate(s) in that state. SBC-12STATE’s uniform GUI and application to application OSS interfaces allow CLEC, SBC-12STATE’s retail operations and/or its advanced services affiliate(s), to have real time electronic access as a preordering function to the loop makeup information.

Related to Loop Makeup Information and Ordering

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!