NOW may Sample Clauses

NOW may use BellSouth’s Unbundled Loop Modification (ULM) offering to remove excessive bridged taps and/or load coils from any copper Loop within the BellSouth network. Therefore, some Loops that would not qualify as UCL-ND could be transformed into Loops that do qualify, using the ULM process.
AutoNDA by SimpleDocs
NOW may request BellSouth to make other rearrangements to the End User premise wiring terminations or terminal enclosure on a time and materials cost basis.
NOW may reserve facilities for up to four (4) business days for each facility requested through LMU from the time the LMU information is returned to NOW. During and prior to NOW placing an LSR, the reserved facilities are rendered unavailable to other customers, including BellSouth. If NOW does not submit an LSR for a UNE service on a reserved facility within the four (4)-day reservation timeframe, the reservation of that spare facility will become invalid and the facility will be released.
NOW may purchase resale services from BellSouth for their own use in operating their business. The resale discount will apply to those services under the following conditions:
NOW may resell services only within the specific service area as defined in its certificate of operation approved by the Commission.
NOW may resell services that are provided at a volume discount in accordance with terms and conditions of applicable tariff. NOW shall not aggregate end user lines and/or traffic in order to qualify for volume discount.
AutoNDA by SimpleDocs

Related to NOW may

  • NOW, WHEREFORE in consideration of the mutual promises and covenants set forth in this Agreement, the receipt and sufficiency of which are hereby acknowledged, the parties hereto agree as follows:

  • PLEASE READ CAREFULLY THIS AGREEMENT INCLUDES A RELEASE OF ALL KNOWN AND UNKNOWN CLAIMS.

  • Please Issue a check payable to Borrower or

  • Identity Verification In the case that the Subscriber provides telecommunication services to any Subscriber’s Customers pursuant to Section 8.1, the Subscriber is responsible for performing and shall perform personal identification of Subscriber’s Customer. SORACOM shall not bear any responsibility in relation to dealing with such matters.

  • Eligibility Verification (a) HHSC will verify Medicaid eligibility for Dual Eligible Members by the fifth business day of the month following the receipt of the MA Dual SNP’s monthly enrollment file, in accordance with Section 3.02(b). (b) To verify Medicaid eligibility of an individual Member, HHSC agrees to provide the MA Dual SNP with real-time access to HHSC’s claims administrator’s Medicaid eligibility verification system.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Prudential Measures 1. Notwithstanding any other provisions of this Agreement, a Party shall not be prevented from taking measures relating to financial services for prudential reasons, including for the protection of investors, depositors, policy holders or persons to whom a fiduciary duty is owed by an enterprise supplying financial services, or to ensure the integrity and stability of its financial system. 2. Where measures mentioned in paragraph 1 do not conform to the provisions of this Agreement, they shall not be used as a means of avoiding the Party's commitments or obligations under this Agreement.

  • Right of Refusal The proposing vendor has the right not to sell under the awarded agreement with a TIPS member at vendor's discretion unless required by law.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!