Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
Approach All investments are to be made using the value approach by investing in companies at prices below their underlying long term values to protect capital from loss and earn income over time and provide operating income as needed. With regard to equities, no attempt is made to forecast the economy or the stock market. The manager will attempt to identify financially sound companies with good potential profitability which are selling at large discounts to their intrinsic value. Appropriate measures of low prices may consist of some or all of the following characteristics: low price earnings ratios, high dividend yields, significant discounts to book value, and free cash flow. Downside protection is obtained by seeking a margin of safety in terms of a sound financial position and a low price in relation to intrinsic value. Appropriate measures of financial integrity which are regularly monitored, include debt/equity ratios, financial leverage, asset turnover, profit margin, return on equity, and interest coverage. As a result of this bargain hunting approach, it is anticipated that purchases will be made when economic and issue-specific conditions are less than ideal and sentiment is uncertain or negative. Conversely, it is expected that gains will be realized when issue-specific factors are positive and sentiment is buoyant. The investment time horizon is one business cycle (approximately 3-5 years). As regards bonds, the approach is similar. No attempt is made to forecast the economy or interest rates. The manager will attempt to purchase attractively priced bonds offering yields better than Treasury bonds with maturities of 10 years or less that are of sound quality i.e. whose obligations are expected to be fully met as they come due. We do not regard rating services as being an unimpeachable source for assessing credit quality any more than we would regard a broker's recommendation on a stock as being necessarily correct. In any form of investment research and evaluation, there is no substitute for the reasoned judgement of the investment committee and its managers.
CONSULTATIVE MECHANISMS 11.1 Effective consultation is essential for continuous workplace reform and such consultation can take place at any time during the life of a project. Consultative Committees may be set up on larger projects for this purpose. The Consultative Committee will operate for the purpose of continually assessing the efficiency of working arrangements, monitoring the outcomes of this Agreement, coordinating training activities and sharing pertinent information.
Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.
Constraints This agreement is expressly subject to the debt limitations of the Oregon Constitution set forth in Article XI, Section 10 and is contingent upon funds being available and appropriated therefore. Any provisions of this agreement which would conflict with law are deemed inoperative to that extent.
FINANCIAL IMPLICATIONS There are no budget implications. The applicant will be responsible for all costs, expenses, liabilities and obligations imposed under or incurred in order to satisfy the terms of this proposed development agreement. The administration of the proposed development agreement can be carried out within the approved 2019- 2020 budget and with existing resources.
Protocol The attached Protocol shall be an integral part of this Agreement.
Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.
Service Level Expectations Without limiting any other requirements of the Agreement, the Service Provider shall meet or exceed the following standards, policies, and guidelines:
Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.