We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Remote Terminals Sample Clauses

Remote Terminals. Controlled Environmental Vaults (CEV), Huts, Remote Terminals and Cabinets and other AT&T owned or controlled premises where collocation is practical and technically feasible, e.g. where heat dissipation is not severely limited or there is sufficient space for Collocator’s equipment.
Remote Terminals. There shall be no restrictions upon the source or type of remote terminals used by any Bureau, or any of its customers, except that such terminals shall be compatible with the ACROPAC System(TM).
Remote TerminalsThe Commission may not require a common carrier to provide a remote terminal for electronic access under subsection (c).

Related to Remote Terminals

  • Remote Terminal Unit Prior to the Initial Synchronization Date of the Large Generating Facility, a Remote Terminal Unit, or equivalent data collection and transfer equipment acceptable to the Parties, shall be installed by Developer, or by Connecting Transmission Owner at Developer’s expense, to gather accumulated and instantaneous data to be telemetered to the location(s) designated by Connecting Transmission Owner and NYISO through use of a dedicated point-to-point data circuit(s) as indicated in Article 8. 1. The communication protocol for the data circuit(s) shall be specified by Connecting Transmission Owner and NYISO. Instantaneous bi-directional analog real power and reactive power flow information must be telemetered directly to the location(s) specified by Connecting Transmission Owner and NYISO. Each Party will promptly advise the appropriate other Party if it detects or otherwise learns of any metering, telemetry or communications equipment errors or malfunctions that require the attention and/or correction by that other Party. The Party owning such equipment shall correct such error or malfunction as soon as reasonably feasible.

  • Remote Work Buyer agrees that Honeywell may provide some or all of the Services remotely using an internet connection and may install additional software and related communication and/or diagnostic devices on Buyer's applicable systems (the “Systems”) to enable such connection and/or remote work. Xxxxx agrees to fully cooperate with Honeywell’s installation and commissioning of such software and devices on the Systems. To the extent required by Honeywell, Buyer will enable and consents to internet connectivity between its applicable Systems and Honeywell’s applicable computer server(s)/system(s) and/or the Honeywell cloud platform(s) throughout the term of this Agreement.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Transmission and Routing of Telephone Exchange Service Traffic 50.4.1 The Appendix Reciprocal Compensation, which is/are attached hereto and incorporated herein by reference, prescribe traffic routing parameters for Local Interconnection Trunk Group(s) the Parties shall establish over the Interconnections specified in the Appendix ITR, which is/are attached hereto and incorporated herein by reference.

  • Remote Access Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to Reconex for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers. 3.2 Except as otherwise required by Applicable Law, subject to Section 3.1, Verizon shall have the right to add, modify, grandfather, discontinue or withdraw, Verizon Telecommunications Services at any time, without the consent of Reconex. 3.3 To the extent required by Applicable Law, the Verizon Telecommunications Services to be provided to Reconex for resale pursuant to this Attachment will include a Verizon Telecommunications Service customer-specific contract service arrangement (“CSA”) (such as a customer specific pricing arrangement or individual case based pricing arrangement) that Verizon is providing to a Verizon Customer at the time the CSA is requested by Reconex.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • External Hosting Facilities DST shall implement controls, consistent with applicable prevailing industry practices and standards, regarding the collection, use, storage and/or disclosure of Fund Data by an external hosting provider.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Telephone Monitoring You agree that Chase and its third-party service providers may listen to and record telephone calls as part of providing program services.