Mobile to Mobile Clause Samples

Mobile to Mobile direction For telephone calls between MESs, twice the normal charge. Measured and invoiced as two separate parts with one part included in the Mobile to Land direction volume and the remaining part included in the Land to Mobile volume in A7.1 above.
Mobile to Mobile. GTA mobile to mobile minutes are minutes used between GTA wireless subscribers while on the GTA wireless network (and not roaming.) Mobile to mobile applies to the account or phone number when directly dialing or receiving calls from any other GTA mobile phone number within the GTA network. Calls to GTA Voicemail are not considered mobile to mobile minutes.

Related to Mobile to Mobile

  • Use of School Equipment The Association shall have the right to use school facilities and equipment, including computer hardware, peripherals, software, duplicating equipment, calculating machines and all types of audiovisual equipment at reasonable times, when such equipment is not otherwise in use. Use of school equipment to be used without charge and within reason.

  • Mobile Sierra Notwithstanding any provision of this Agreement, neither Party shall seek, nor shall they support any third party seeking, to prospectively or retroactively revise the rates, terms or conditions of service of this Agreement through application or complaint to the FERC pursuant to the provisions of the Federal Power Act, absent prior written agreement of the Parties. Further, absent the prior written agreement in writing by both Parties, the standard of review for changes to the rates, terms or conditions of service of this Agreement proposed by a Party, a non-Party, or the FERC acting sua sponte shall be the “public interest” standard of review set forth in United States Gas Pipe Line Co. v.

  • System Use (a) An electronic site access system may be used on site, subject to the requirements of this statement. (b) The system operates via: (i) a facial recognition device; and (ii) an electronic gate. (c) The system will be installed at the access and egress point/s of the site and will only be utilised to identify presence on site. (d) The purpose for which the electronic site access system will be implemented is to ensure: (i) avoiding unauthorised access to site; (ii) confirmation and co-ordination of effort in emergency situations; and (iii) confirmation that all entrants to site have received a site specific induction; (e) The only personal data collected by the system is a site entrant’s: (i) image; (ii) first & last name; (iii) mobile phone number; (iv) email address; and (v) employer’s name. (the Collected Data) (f) The Collected Data will only be held or used for the purposes specified above, unless otherwise by consent or required by law. (g) The Employer will not use the electronic site access control system to verify who was on a site at a particular time for the purpose of: (i) evaluating whether a variation claim regarding labour costs made by a subcontractor can be substantiated; (ii) taking disciplinary action against an Employee, or assisting a subcontractor to take disciplinary action against its own employees, regarding their start and finish times; or (iii) otherwise generally tracking a worker’s movements whilst on the site.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.