Network Etiquette The user is expected to abide by the generally accepted rules of network etiquette. These include, but are not limited to, the following:
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Digital Health The HSP agrees to:
Broadband Services Notwithstanding any other provision of the Amended Agreement (but subject to and without limiting Section 2 above and Section 4.4 below), when PaeTec seeks access to a Hybrid Loop for the provision of "broadband services," as such term is defined by the FCC, then in accordance with 47 C.F.R. § 51.319(a) and the Arbitration Orders, Verizon shall provide PaeTec with nondiscriminatory access under the Amended Agreement to the existing time division multiplexing features, functions, and capabilities of that Hybrid Loop, including DS1 or DS3 capacity (where impairment has been found to exist, which, for the avoidance of any doubt, does not include instances in which Verizon is not required to provide a DS1 Loop under Section 3.4.1 below or is not required to provide a DS3 Loop under Section 3.4.2 below) on an unbundled basis to establish a complete transmission path between the Verizon central office serving an end user and the end user's customer premises. This access shall include access to all features, functions, and capabilities of the Hybrid Loop that are not used to transmit packetized information.
Games The Private Party shall not be entitled to introduce any arcade type amusement or gaming machines into the Restaurant Facility without the prior written approval of SANParks.
Integrated Digital Loop Carriers The feeder portion of some loops may be provide by means of Integrated Digital Loop Carrier (IDLC). IDLC provides a fiber optic cable transmission path that travels directly into BellSouth’s central office local switch. Where BellSouth uses IDLC ,if technically feasible and capacity does exist, BST will provide Al-Call with a Designed DS0 UVL by using alternative provisioning techniques including but not limited to such as “hairpinning” and DAC grooming. Alternative provisioning techniques will be provided at no additional cost to Al-Call . Hairpinning involves providing a DS0 signal from an IDLC-served loop to Al-Call ’s collocation equipment by using a dedicated pathway that traverses BellSouth’s central office switch. BellSouth will provide such DS0 signal to Al-Call by establishing a copper cross connect between the BellSouth switch and Al-Call ’s collocation equipment.
Links If The Services are made available through the Internet, the Financial Institution’s website may provide links to other websites, including those of Third Parties who may also provide services to You. You acknowledge that all those other websites and Third Party services are independent from the Financial Institution’s and may be subject to separate agreements that govern their use. The Financial Institution and Central 1 have no liability for those other websites or their contents or the use of Third Party services. Links are provided for convenience only, and You assume all risk resulting from accessing or using such other websites or Third Party services.