Gold Open Access Articles May be shared according to the author-selected end-user license and should contain a CrossMark logo, the end user license, and a DOI link to the formal publication on ScienceDirect. Please refer to Elsevier's posting policy for further information.
Global Access Transport Charges (U S. Bridged): Per-minute per-bridge port usage charges, based on availability of service, zone and origination access type. Bridging charges are additional and are priced at Customer's applicable Toll Meet Meet-Me Access rate per minute.
Unbundled Loop Modifications (Line Conditioning 2.5.1 Line Conditioning is defined as routine network modification that BellSouth regularly undertakes to provide xDSL services to its own customers. This may include the removal of any device, from a copper Loop or copper Subloop that may diminish the capability of the Loop or Subloop to deliver high-speed switched wireline telecommunications capability, including xDSL service. Such devices include, load coils, excessive bridged taps, low pass filters, and range extenders. Excessive bridged taps are bridged taps that serves no network design purpose and that are beyond the limits set according to industry standards and/or the BellSouth’s TR 73600 Unbundled Local Loop Technical Specification. 2.5.2 BellSouth will remove load coils only on copper Loops and Subloops that are less than eighteen thousand (18,000) feet in length. 2.5.3 For any copper loop being ordered by NewPhone which has over six thousand (6,000) feet of combined bridged tap will be modified, upon request from NewPhone, so that the loop will have a maximum of six thousand (6,000) feet of bridged tap. This modification will be performed at no additional charge to NewPhone. Loop conditioning orders that require the removal of bridged tap that serves no network design purpose on a copper Loop that will result in a combined total of bridged tap between two thousand five hundred (2,500) and six thousand (6,000) feet will be performed at the rates set forth in Exhibit A. 2.5.4 NewPhone may request removal of any unnecessary and non-excessive bridged tap (bridged tap between zero (0) and two thousand five hundred (2,500) feet which serves no network design purpose), at rates pursuant to BellSouth’s SC Process as mutually agreed to by the Parties. 2.5.5 Rates for ULM are as set forth in Exhibit A. 2.5.6 BellSouth will not modify a Loop in such a way that it no longer meets the technical parameters of the original Loop type (e.g., voice grade, ADSL, etc.) being ordered. 2.5.7 If NewPhone requests ULM on a reserved facility for a new Loop order, BellSouth may perform a pair change and provision a different Loop facility in lieu of the reserved facility with ULM if feasible. The Loop provisioned will meet or exceed specifications of the requested Loop facility as modified. NewPhone will not be charged for ULM if a different Loop is provisioned. For Loops that require a DLR or its equivalent, BellSouth will provide LMU detail of the Loop provisioned. 2.5.8 NewPhone shall request Loop make up information pursuant to this Attachment prior to submitting a service inquiry and/or a LSR for the Loop type that NewPhone desires BellSouth to condition. 2.5.9 When requesting ULM for a Loop that BellSouth has previously provisioned for NewPhone, NewPhone will submit a SI to BellSouth. If a spare Loop facility that meets the Loop modification specifications requested by NewPhone is available at the location for which the ULM was requested, NewPhone will have the option to change the Loop facility to the qualifying spare facility rather than to provide ULM. In the event that BellSouth changes the Loop facility in lieu of providing ULM, NewPhone will not be charged for ULM but will only be charged the service order charges for submitting an order.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.
Interconnection Facility Options The Intercarrier Compensation provisions of this Agreement shall apply to the exchange of Exchange Service (EAS/Local) traffic between CLEC's network and Qwest's network. Where either Party acts as an IntraLATA Toll provider, each Party shall xxxx the other the appropriate charges pursuant to its respective tariff or price lists. Where either Party interconnects and delivers traffic to the other from third parties, each Party shall xxxx such third parties the appropriate charges pursuant to its respective tariffs, price lists or contractual offerings for such third party terminations. Absent a separately negotiated agreement to the contrary, the Parties will directly exchange traffic between their respective networks without the use of third party transit providers.
Post-Closing Access (a) Following the Closing Date, Ceding Company and its Affiliates shall: (i) allow Reinsurer, through its Representatives, upon reasonable prior written notice and during normal business hours, the right, at Reinsurer’s sole cost and expense, to examine and make copies of any books and records related to the Business which are retained by Ceding Company or any of its Affiliates (including the Books and Records set forth in Schedule 5.7) for any reasonable business purpose, including the preparation or examination of Reinsurer’s Tax Returns, regulatory and statutory filings, responses to regulatory inquiries and financial statements; (ii) allow Reinsurer, through its Representatives, to interview Ceding Company’s employees for any reasonable business purpose relating to the Business, including the preparation or examination of Tax Returns, regulatory and statutory filings and financial statements and the conduct of any litigation relating to the Business, or the conduct of any regulatory, contract holder, participant or other dispute resolution whether pending or threatened; and (iii) maintain such books and records for Reinsurer’s examination and copying until at least the later of the sixth (6th) anniversary of the Closing Date or, with respect to all Tax books and records, until sixty (60) days after the expiration of any period imposed by Applicable Law, after which Ceding Company may destroy such books and records in its discretion; provided, however, that at any time prior to such destruction Ceding Company shall give Reinsurer a reasonable opportunity, at Reinsurer’s expense, to segregate and remove such books and records as Reinsurer may select. Reinsurer shall pay any out-of-pocket expenses incurred in connection with Reinsurer’s access to such employees and books and records related to the Business. Access to such employees and books and records shall not unreasonably interfere with Ceding Company’s or any successor company’s business operations. (b) Following the Closing Date, Reinsurer shall: (i) allow Ceding Company, through its Representatives, upon reasonable prior written notice and during normal business hours the right to examine and make copies, at Ceding Company’s expense, of the Books and Records transferred to Reinsurer at the Closing; (ii) allow Ceding Company, through its Representatives to interview Reinsurer’s employees specifically dedicated to the Business in connection with Ceding Company’s preparation or examination of Tax Returns, regulatory and statutory filings, responses to regulatory inquiries and financial statements, or Ceding Company’s conduct of any regulatory, contract holder, participant or other dispute resolution whether pending or threatened; and (iii) maintain such Books and Records for Ceding Company’s examination and copying until at least the later of the sixth (6th) anniversary of the Closing Date or, with respect to all Tax books and records, until sixty (60) days after the expiration of any period imposed by Applicable Law after which Reinsurer may destroy such books and records in its discretion; provided, however, that at any time prior to such destruction Reinsurer shall give Ceding Company a reasonable opportunity, at Ceding Company’s expense, to segregate and remove such books and records as Ceding Company may select. Access to such employees and Books and Records shall not unreasonably interfere with the business operations of Reinsurer or its Affiliates. Ceding Company shall pay any out-of-pocket expenses incurred in connection with Ceding Company’s access to such employees and Books and Records. (c) Notwithstanding any other provision of this Section 5.10, access to any books and records may be denied by either party if such party is required under Applicable Law relating to privacy issues to deny such access, or to protect attorney-client privilege or attorney work product; provided, however, that to the extent that any request by either party for post-Closing access would not violate Applicable Law relating to privacy if a waiver were obtained from a Contract Owner, Ceding Company and Reinsurer shall use all commercially reasonable efforts to obtain such a waiver.
REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.
Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.