Unauthorized Use of Available Fiber Sample Clauses

Unauthorized Use of Available Fiber. 1.10.1. The County may examine and audit Licensee's Equipment as provided in Section 6.3. If the County finds that Licensee has interconnected with any Available Fiber for which Licensee does not hold a License, the County may assess a one-time charge payable by Licensee equal to double the amount Licensee would have paid for the use of such Available Fiber at the Standard Pricing, plus interest thereon calculated at a rate of one and one-half percent (1.5%) per month from the date that the unauthorized use first occurred.
AutoNDA by SimpleDocs
Unauthorized Use of Available Fiber. 1.10.1. The County may examine and audit Licensee's Equipment as provided in Section 6.3 for the purpose of assessing whether the Licensee has interconnected with any Available Fiber for which Licensee does not hold a License. If the County finds that Licensee DocuSign Envelope ID: BEC22014-FB44-42A2-A4F0-A3D7312123F2 DocuSign Envelope ID: BACFA1E8-9B50-4E40-B928-AE77686FB55C has interconnected with any Available Fiber for which Licensee does not hold a License, the County may assess a one-time charge payable by Licensee equal to double the amount Licensee would have paid for the use of such Available Fiber at the Standard Pricing, plus interest thereon calculated at a rate of one and one-half percent (1.5%) per month, or the maximum rate permitted by law, whichever is less, from the date that the unauthorized use first occurred.

Related to Unauthorized Use of Available Fiber

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary:

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit B.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Changes The terms of Section 1 of Article VI apply to the resolution of any unauthorized changes regarding Number Portability.

Time is Money Join Law Insider Premium to draft better contracts faster.