User Migration Sample Clauses

User Migration. Synacor will use commercially reasonable efforts to ensure a smooth migration of Users to other portals or services. AT&T shall have the right to migrate all Users away from the Portal at any time during the Wind-Down Period at its discretion.
AutoNDA by SimpleDocs

Related to User Migration

  • Migration MCK shall provide all requisite assistance as is reasonably requested by NewCo in order to migrate the Services from MCK’s personnel, facilities and environment to NewCo’s (or its designee’s) personnel, facilities and environment, provided, that, other than as expressly set forth in the Service Schedule, NewCo shall be responsible for all third-party costs incurred by MCK and its Affiliates to migrate such Services and, provided further, that, NewCo shall be responsible for all costs associated with operational decisions made by NewCo for its set-up costs and costs to procure items (e.g., selection of Customer Relationship Management software). For the avoidance of doubt, NewCo will be responsible for migration to any new NewCo Data Center, including design, implementation and testing. MCK will provide reasonable support in such efforts. MCK will provide to NewCo an electronic copy in the then-current format of all data that is owned by NewCo (a) a written description of processes and procedures used by MCK in connection with the provision of Services to the Core MTS Business to the extent such descriptions exist, (b) a written description of all system documentation, architecture diagrams and business process diagrams for the systems, processes and controls used in the Core MTS Business to the extent such descriptions exist and (c) written training and onboarding materials used in the Core MTS Business to the extent such materials exist. In addition, MCK will, upon NewCo’s reasonable request, make available knowledgeable MCK personnel for knowledge transfer and discussion at a mutually agreed upon time with respect to the Services and the processes, procedures and systems used in the provision of the Services. The parties will meet in person to establish, within two (2) weeks following the Closing Date, a planning process for the migration of the Services from MCK’s personnel, facilities and environment to NewCo’s (or its designee’s) personnel, facilities and environment. During such meetings, the parties will identify workstreams and workstream leaders, staff project teams for each workstream, identify roles and responsibilities for project team members and create a project charter that will serve collectively as the basis for developing more detailed timelines and specific deliverables for each of the workstreams. At a minimum, there will be a workstream for each functional area that is the subject of Schedules. Each workstream will report to the Project Managers. The parties will meet (in person or by telephone) as often as is reasonably necessary to develop such detailed timelines and specific deliverables for each workstream.

  • Bulk Migration 2.1.9.1 If Southern Telecom requests to migrate twenty-five (25) or more UNE- Port/Loop Combination (UNE-P) customers to UNE-Loop (UNE-L) in the same Central Office on the same due date, Southern Telecom must use the Bulk Migration process, which is described in the BellSouth CLEC Information Package, “UNE-Port/Loop Combination (UNE-P) to UNE-Loop (UNE-L) Bulk Migration.” This CLEC Information package, incorporated herein by reference as it may be amended from time to time, is located at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/xxxxxx/xxxx/xxxx.xxxx. The rates for the Bulk Migration process shall be the nonrecurring rates associated with the Loop type being requested on the Bulk Migration, as set forth in Exhibit A of this Attachment. Additionally, OSS charges will also apply per LSR generated per customer account as provided for in the Bulk Migration Request. The migration of loops from Integrated Digital Loop Carrier (IDLC) will be done pursuant to Section 2.6 of this Attachment.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!