IP Addresses Authorized Users shall be identified and authenticated by the use of Internet Protocol ("IP") addresses provided by the Licensee to the Distributor. The use of proxy servers by the Licensee or the Participating Institutions is authorized as long as any proxy server IP addresses provided limit remote or off- campus access to the Authorized Users. Authorized IP Addresses are listed in Appendix C. An updated list will be sent to the Distributor on an annual or as- needed basis without the need to amend this Agreement. Alternatively, if the Publisher is utilizing its own and/or third-party system for IP range change notification (such as e.g. IP Registry), then an updated list may be sent via such system instead. The Distributor shall ensure that the Publisher shall use reasonable efforts to cooperate with the Participating Institutions in the implementation of new authentication protocols and procedures (such as Shibboleth) as they are developed during the term of this Agreement. Both the Licensee and the Distributor will provide cooperation to coordinate or facilitate this process but they will not be liable for correct implementation of such authentication protocols and procedures (which remain the full responsibility of the Publisher and the respective Participating Institution).
Names and Addresses of Members The Members' names and addresses are attached as Schedule 1 to this Agreement.
Notice Addresses A notice, request, direction, consent, waiver or other communication must be addressed to the recipient at its address stated in Schedule B to the Sale and Servicing Agreement, which address the party may change by notifying the other party.
Communications in Writing Any communication to be made under or in connection with the Finance Documents shall be made in writing and, unless otherwise stated, may be made by fax or letter.
T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.