UNAUTHORIZED NETWORK NODE ON SERVICE POLES Sample Clauses

UNAUTHORIZED NETWORK NODE ON SERVICE POLES. 3.3.1. The City Manager shall deem as unauthorized any type of Network Node attached or Collocated to a Service Pole if there is no Agreement, even if it was inadvertently and incorrectly permitted. The City Manager at his or her sole discretion may, upon 30 days’ written notice, remove or require the Licensee to remove unauthorized Network Node at Licensee’s expense without any liability to the City. The City will invoice and Licensee shall reimburse the City within 30 days of receipt of the invoice for the City’s cost of removal of unauthorized Network Node, along with any other damages suffered by City as a result of Licensee’s unauthorized acts.
AutoNDA by SimpleDocs
UNAUTHORIZED NETWORK NODE ON SERVICE POLES. A. The City Manager shall deem as unauthorized any type of Network Node attached or Collocated to a Service Pole if there is no Agreement, even if it was inadvertently and incorrectly permitted. The City Manager at his or her sole discretion may, upon 30 days’ written notice, remove or require the Licensee to remove any unauthorized Network Node at Licensee’s expense without any liability to the City. The City will invoice and Licensee shall reimburse the City within 30 days of receipt of the invoice for the City’s cost of removal of an unauthorized Network Node.

Related to UNAUTHORIZED NETWORK NODE ON SERVICE POLES

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Software Casos de Uso Red Hat Enterprise Linux Desktop Red Hat Enterprise Linux Workstation Sistemas de computadoras personales con el fin principal de ejecutar aplicaciones y/o servicios para un usuario único que por lo general trabaja con una conexión directa al teclado y la pantalla. Nota: La implantación de autorizaciones asociadas de sistema Red Hat Network o Módulos de Gestión Inteligente en un sistema que no sea Red Hat Enterprise Linux Desktop o Workstation no es un Caso de Uso soportado.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Processing of Customer Personal Data 3.1 UKG will:

  • E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!