Telephone Monitoring/Recording From time to time we may monitor and/or record telephone calls between you and us to assure the quality of our customer service or as required by applicable law.
Recording telephone calls You consent to our recording of your telephone calls with us (whether made via TBS or otherwise) and for such recordings to be used for any purpose as we deem fit including to provide evidence of instructions and other verbal communications, for quality and training purposes, as evidence in any proceedings against you or any other person.
Telephone Recording Each party consents to the recording of the telephone conversations of trading and marketing personnel in connection with this Agreement or any potential Transaction and consents to such recording being used as evidence in court proceedings.
Telephone Monitoring You agree that Chase and its third-party service providers may listen to and record telephone calls as part of providing program services.
Telephone Calls Calling, Monitoring and Recording For our mutual protection, and to enable us to provide better service to you, we may monitor and/or tape-record any of our telephone conversations.
Records; Visits The books and records pertaining to the Fund, which are in the possession or under the control of PFPC, shall be the property of the Fund. Such books and records shall be prepared and maintained as required by the 1940 Act and other applicable securities laws, rules and regulations. The Fund and Authorized Persons shall have access to such books and records at all times during PFPC's normal business hours. Upon the reasonable request of the Fund, copies of any such books and records shall be provided by PFPC to the Fund or to an Authorized Person, at the Fund's expense.
Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.
Telephone Access Employees shall be entitled to reasonable use of the client's telephone for local calls during the evening to speak with family members (i.e., spouse, children, dependants, parents). Employees may not receive personal calls on the client's telephone nor give out the client's telephone number. In the case of urgent personal calls to the employee, messages will be taken by the Employer and passed on to the employee as soon as possible. In the event of an emergency, the employee shall use the client's telephone to contact the appropriate authorities or the contact person designated by the Employer.
Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.