Unauthorized Network Node definition

Unauthorized Network Node means any Network Node of Licensee for which Licensee not obtained a Permit.
Unauthorized Network Node means any Network Node of Licensee (a) that was installed before execution of an Agreement or other valid wireless installation license agreement; (b) that was installed after termination or expiration of an Agreement or other valid wireless installation license agreement; (c) for which Licensee failed to obtain a Permit; or (d) that is not in compliance with the requirements of the Permit issued for said Network Node.
Unauthorized Network Node means any Network Node or Node Support Pole (a) for which the Network Provider failed to obtain a Permit; or (b) which is not in compliance with the requirements of the Permit issued for said Network Node or Node Support Pole. A Network Node or Node Support Pole installed by an entity that failed to execute a Wireless Installation Agreement or installed after the expiration or termination of a Wireless Installation Agreement shall also be considered an Unauthorized Attachment.

Examples of Unauthorized Network Node in a sentence

  • If an Attachment or a Network Node belonging to a Licensee is unauthorized as specified herein, NBU, without prejudice to its other rights or remedies, may assess an Unauthorized Attachment Charge or Unauthorized Network Node Charge as specified in Appendix H, for each Unauthorized Attachment or Unauthorized Network Node.

  • Attachment Charge or Unauthorized Network Node Charge within the thirty (30) days allotted, the Licensee must remove its Unauthorized Attachment or Unauthorized Network Node.

  • An Attachment is an Unauthorized Attachment and a Network Node is an Unauthorized Network Node where no Permit has been issued by NBU.The Unauthorized Attachment Charge or Unauthorized Network Node Charge is due and payable irrespective of whether a Permit is subsequently issued to the Licensee for the Unauthorized Attachment or Unauthorized Network Node.2. Assessment of Charge for Unauthorized Attachments or Unauthorized Network Nodes.

  • If Licensee fails to remove the Unauthorized Attachments or Unauthorized Network Nodes within the time provided, NBU may remove them without liability and the Licensee shall promptly reimburse NBU for the expense, plus $250, together with payment of the Unauthorized Attachment Charge or Unauthorized Network Node Charge, no later than thirty (30) days following NBU’s issuance of an invoice.

  • Such notice shall include the specific location of the Eligible Pole where the Unauthorized Attachment or Unauthorized Network Node is found and the nature of the Unauthorized Attachment or Unauthorized Network Node.

  • Any Network Node not covered by an Agreement found mounted onto or supported by an Eligible Pole shall be considered an Unauthorized Network Node subject to Unauthorized Network Node Charges and any other sanctions or remedies specified herein or in the Agreement.

  • Licensee remains obligated to pay the Unauthorized Attachment Charge or Unauthorized Network Node Charge within thirty (30) days.

  • Within thirty (30) days of receipt of a Notice of Unauthorized Attachment or Unauthorized Network Node, the Licensee must submit to NBU for the Unauthorized Attachment or Unauthorized Network Node: (a) an Application for a Permit; (b) the correct Application Fee; and (c) the Unauthorized Attachment Charge or Unauthorized Network Node Charge.

  • NBU, without prejudice to its other rights or remedies, will send the Licensee a written Notice of the Unauthorized Attachment or Unauthorized Network Node, a copy of which is referenced in Appendix B.

  • NBU shall issue a Notice of Unauthorized Attachment or Unauthorized Network Node, referenced in Appendix B, promptly upon discovery of an Unauthorized Attachment or Unauthorized Network Node to the Licensee that owns such Attachment(s) or Network Node(s).

Related to Unauthorized Network Node

  • Unauthorized Use means either of the following:

  • Unauthorized Access means the entrance of a person into a restricted area without permission of the operator or the operator’s designated representative.

  • Unauthorized Code means any virus, Trojan horse, worm, or other software routines or hardware components designed to permit unauthorized access, to disable, erase, or otherwise harm Software, hardware or data.

  • Unauthorized alien means an alien as defined in Section 1324a(h)(3) of Title 8 of the United States Code.

  • Unauthorized Gas means (a) the quantity of gas taken by Customer exceeding the amount which is permitted during a Period of Interruption or (b) the difference (whether positive or negative) between the quantity of gas taken by Customer and the volumes provided for under an Operational Flow Order.

  • Trusted Network means a network operated and maintained by the Contractor, which includes security controls sufficient to protect DSHS Data on that network. Controls would include a firewall between any other networks, access control lists on networking devices such as routers and switches, and other such mechanisms which protect the confidentiality, integrity, and availability of the Data.

  • Authorized User means a person:

  • Unauthorized Third Party means any person or entity that, at the time of the Computer Fraud, is not an Authorized User.

  • Authorized Users(s) means an individual or individuals with a business need to access DSHS Confidential Information, and who has or have been authorized to do so.

  • Customer Proprietary Network Information (“CPNI”) is as defined in the Act.

  • End User means, in the event that the Services or Deliverables involve the use of any information systems, any and all UNICEF employees, consultants and other personnel and any other external users collaborating with UNICEF, in each case, authorized by UNICEF to access and use the Services and/or Deliverables.

  • Server Software means software that provides services or functionality on a computer acting as a server.

  • Unauthorized disclosure or "unauthorized release" means any disclosure or release not permitted by federal or state statute or regulation, any lawful contract or written agreement, or that does not respond to a lawful order of a court or tribunal or other lawful order.

  • Supplier Software means software which is proprietary to the Supplier or its Affiliates which is used or supplied by the Supplier in the provision of the Services; Supplier Staff means all persons employed or engaged by the Supplier together with the Supplier's servants, agents, suppliers, consultants and Sub-Contractors (and all persons employed by any Sub-Contractor together with the Sub-Contractor’s servants, consultants, agents, suppliers and Sub-Contractors) used in the performance of its obligations under this Contract; Time and Materials means the pricing mechanism for the Services as may be agreed by the Parties and set out at paragraph Error: Reference source not found in the SOW; TUPE means the Transfer of Undertakings (Protection of Employment) Regulations 2006 (SI 2006/246) as amended or replaced or any other regulations or UK legislation implementing the Acquired Rights Directive; Velocity means the Metric which measures the total number of Story Points for Stories that have been accepted in a Sprint, indicating the rate of progress towards Acceptance of all Stories from the Product Backlog;

  • Mobile Network means a 3G or 4G network or any other mobile communications network which we choose to provide Mobile services.

  • Unauthorized Removal means the Contractor’s removal of Key Personnel without the prior written consent of the State.

  • Commercial Software means Software developed or regularly used that: (i) has been sold, leased, or licensed to the general public; (ii) has been offered for sale, lease, or license to the general public; (iii) has not been offered, sold, leased, or licensed to the public but will be available for commercial sale, lease, or license in time to satisfy the delivery requirements of this Contract; or (iv) satisfies a criterion expressed in (i), (ii), or (iii) above and would require only minor modifications to meet the requirements of this Contract.

  • Authorized Users means Customer’s employees or Authorized Agents.

  • Customer Software means software which is owned by or licensed to the Customer;

  • Unauthorized signature means one made without actual, implied, or apparent authority and includes a forgery.

  • pseudonymisation means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person;

  • Client Application means an application developed by Licensee that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.

  • Supported Web Browser means the current release from time to time of Microsoft Edge, Mozilla Firefox, Google Chrome or Apple Safari, or any other web browser that the Provider agrees in writing shall be supported;

  • Urgent Works means any urgent measures, which in the opinion of the Engineer-in-charge become necessary during the progress of the work to obviate any risk of accident or failure or which become necessary for security.

  • Web Site means the website that you are currently using (xxx.xxxxxxxxxxxxxxx.xx.xx) and any sub-domains of this site (e.g. xxxxxxxxx.xxx.xxxxxxxxxxxxxxx.xx.xx) unless expressly excluded by their own terms and conditions.

  • Licensed Software includes error corrections, upgrades, enhancements or new releases, and any deliverables due under a maintenance or service contract (e.g., patches, fixes, PTFs, programs, code or data conversion, or custom programming).