Malicious Call Tracing Sample Clauses

Malicious Call Tracing. D. 5.1 Any malicious call tracing must be initiated by Royal Bahamas Police Force or an authority empowered to do so by the laws of the Commonwealth of The Bahamas, and tracing that uses the networks of both Parties must be approved by the appropriate person within each Party. Once these approvals have been obtained, a Party shall co-ordinate the call tracing with the NOC of the other Party. The other Party shall give priority to the request.
AutoNDA by SimpleDocs
Malicious Call Tracing. Authorised malicious call tracing may be requested by either of the Party's ISDs and the other Party shall give priority to such a request.
Malicious Call Tracing. Authorised malicious call tracing may be requested by any of the ISDs. Theother Party shall give priority to the request.NUMBERING ALLOCATION AND ROUTING DIVERSITY APPENDIX 4FOR POINT OF INTERCONNECTION 1. INTRODUCTION 3. This Appendix describes the general routing principles, including routing diversity, tobe employed by Vodacom to Telkom as well as the same principles from Telkom to Vodacom. The allocation of CCS No 7 Destination Point codes is also addressed inthe section relating to numbering. 2. ROUTING PRINCIPLES 2.1 Routing from Telkom to VodacomThe catchment areas within the PSTN served by any POI shall be mutually agreed upon between the parties concerned. Calls from within the agreed PSTN catchmentarea will be routed over the PSTN to the appropriate POI in accordance with the PSTN routing plan at not less than the service levels and grade of service agreed to inAppendix 2 section 4.
Malicious Call Tracing. Authorised malicious call tracing may be requested by any of the ISDs. Theother Party shall give priority to the request.6.4.6 Access to PLMN sites housing transmission line terminating equipment.When faults on the transmission links connecting the MSC and POI arereported, MTN agrees to provide access or assistance to Telkom maintenancepersonnel at these sites during testing and repair of the fault. Telkom cannotbe held responsible for long outages due to lack of reasonable access orassistance at the PLMN sites.5.0

Related to Malicious Call Tracing

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.

  • Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.

  • Intrusion Detection All systems involved in accessing, holding, transporting, and protecting DHCS PHI or PI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.

  • Your Billing Rights: Keep this Document for Future Use This notice tells you about your rights and our responsibilities under the Fair Credit Billing Act.

  • COUNTERFEIT WORK (a) The following definitions apply to this clause:

  • Musculoskeletal Injury Prevention and Control The hospital in consultation with the Joint Health and Safety Committee (JHSC) shall develop, establish and put into effect, musculoskeletal prevention and control measures, procedures, practices and training for the health and safety of employees.

  • Disturbance Analysis Data Exchange The Parties will cooperate with one another and the NYISO in the analysis of disturbances to either the Large Generating Facility or the New York State Transmission System by gathering and providing access to any information relating to any disturbance, including information from disturbance recording equipment, protective relay targets, breaker operations and sequence of events records, and any disturbance information required by Good Utility Practice.

  • Vandalism Vandalism will result in cancellation of privileges. Vandalism is defined as any malicious attempt to harm or destroy data of another user, Internet, or any of the above listed agencies or other networks that are connected to any of the Internet backbones. This includes, but not limited to, the uploading or creation of computer viruses.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!