Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.
Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:
CONSULTATIVE MECHANISMS Effective consultation is essential for continuous workplace reform and such consultation can take place at any time during the life of a project. Consultative Committees may be set up on larger projects for this purpose.
Rights Protection Mechanisms and Abuse Mitigation ‐ Registry Operator commits to implementing and performing the following protections for the TLD:
RECOVERY PROCEDURES The nature and severity of any disaster will influence the recovery procedures. One crucial factor in determining how BellSouth will proceed with restoration is whether or not BellSouth's equipment is incapacitated. Regardless of who's equipment is out of service, BellSouth will move as quickly as possible to aid with service recovery; however, the approach that will be taken may differ depending upon the location of the problem.
Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.
Rights Protection Mechanisms Registry Operator shall implement and adhere to the rights protection mechanisms (“RPMs”) specified in this Specification. In addition to such RPMs, Registry Operator may develop and implement additional RPMs that discourage or prevent registration of domain names that violate or abuse another party’s legal rights. Registry Operator will include all RPMs required by this Specification 7 and any additional RPMs developed and implemented by Registry Operator in the registry-‐registrar agreement entered into by ICANN-‐accredited registrars authorized to register names in the TLD. Registry Operator shall implement in accordance with requirements set forth therein each of the mandatory RPMs set forth in the Trademark Clearinghouse as of the date hereof, as posted at xxxx://xxx.xxxxx.xxx/en/resources/registries/tmch-‐requirements (the “Trademark Clearinghouse Requirements”), which may be revised in immaterial respects by ICANN from time to time. Registry Operator shall not mandate that any owner of applicable intellectual property rights use any other trademark information aggregation, notification, or validation service in addition to or instead of the ICANN-‐
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
GOAL FOR CONTRACTING WITH SMALL AND MINORITY BUSINESSES WOMEN’S BUSINESS ENTERPRISES, AND LABOR SURPLUS AREA FIRMS (if subcontracts are to be let)
Allowable Customizations The Student is permitted to alter or add files to customize the assigned Computer to her/his own working style (i.e., background screens and images, display settings).