Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.
Third Party Use You may allow your agents, contractors and outsourcing service providers (each a “Permitted Third Party”) to use the Product(s) licensed to you hereunder solely for your benefit in accordance with the terms of this XXXX and you are responsible for any such Permitted Third Party’s compliance with this XXXX in such use. Any breach by any Permitted Third Party of the terms of this XXXX will be considered your breach.
Third Party Data Any statistical, industry-related and market-related data, which are included in the Disclosure Package and the Prospectus, is based on or derived from sources that the Company reasonably and in good faith believes to be reliable and accurate, and such data agrees with the sources from which it is derived, and the Company has obtained the written consent for the use of such data from such sources to the extent required.
Third Party Sites The Platform may provide links to third-party web sites. Third parties and third party web sites may have different privacy policies, terms and conditions and business practices than we do. Your dealings or communications with any party other than the Company are solely between you and that third party. Reference on the Site to any product, process, publication or service of any third party by trade name, domain name, trademark, trade identity, service xxxx, logo, and manufacturer or otherwise does not constitute or imply its endorsement or recommendation by the Company.
Third Party Vendors Nothing herein shall impose any duty upon DST in connection with or make DST liable for the actions or omissions to act of the following types of unaffiliated third parties: (a) courier and mail services including but not limited to Airborne Services, Federal Express, UPS and the U.S. Mails, (b) telecommunications companies including but not limited to AT&T, Sprint, MCI and other delivery, telecommunications and other such companies not under the party’s reasonable control, and (c) third parties not under the party’s reasonable control or subcontract relationship providing services to the financial industry generally, such as, by way of example and not limitation, the National Securities Clearing Corporation (processing and settlement services), Fund custodian banks (custody and fund accounting services) and administrators (blue sky and Fund administration services), and national database providers such as Choice Point, Acxiom, TransUnion or Lexis/Nexis and any replacements thereof or similar entities, provided, if DST selected such company, DST shall have exercised due care in selecting the same. Such third party vendors shall not be deemed, and are not, subcontractors for purposes of this Agreement.
Third Party IP A. To the extent that any Third Party IP is included or incorporated in the Work Product by Grantee, Grantee hereby grants to System Agency, or shall obtain from the applicable third party for System Agency’s benefit, the irrevocable, perpetual, non-exclusive, worldwide, royalty-free right and license, for System Agency’s internal business or governmental purposes only, to use, reproduce, display, perform, distribute copies of, and prepare derivative works based upon such Third Party IP and any derivative works thereof embodied in or delivered to System Agency in conjunction with the Work Product, and to authorize others to do any or all of the foregoing. B. Grantee shall obtain System Agency’s advance written approval prior to incorporating any Third Party IP into the Work Product, and Grantee shall notify System Agency on delivery of the Work Product if such materials include any Third Party IP. C. Grantee shall provide System Agency all supporting documentation demonstrating Grantee’s compliance with this Section 6.3, including without limitation documentation indicating a third party’s written approval for Grantee to use any Third Party IP that may be incorporated in the Work Product.
Abuse, Neglect, Exploitation Grantee will; a. take all steps necessary, to protect the health, safety and welfare of its clients and participants. b. develop and implement written policies and procedures for abuse, neglect and exploitation. c. notify appropriate authorities of any allegations of abuse, neglect, or exploitation as required by 25 TAC § 448.703.
Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.
Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.