Unauthorized Switching definition

Unauthorized Switching is as defined in Section 10.11.2.
Unauthorized Switching is as defined in Section
Unauthorized Switching is as defined in SectionVirtual Collocation” is As Defined in the Act.

Examples of Unauthorized Switching in a sentence

  • XIII.7.1 In the event that a Party ports a Customer’s telephone number without such Customer’s knowledge or proper authorization, the other Party will charge the Party which ported the number the Unauthorized Switching charge described in Schedule 10.11.2. A Party also will cooperate to switch the service back to the other Party in as expedient a manner as requested by that Party, notwithstanding normal LNP intervals.

  • However, in the case of unauthorized changes of Requesting Carrier Customers to Ameritech, Ameritech shall also have the duties of the “Carrier” as enumerated in such Resale Tariff, but will pay the Unauthorized Switching Charge, described in the Resale Tariff, to Requesting Carrier.

  • In the event that the Carrier submits an order under this Part, and the end user notifies the Company, within the greater of 90 days or two (2) billing cycles of the date the Carrier submitted an order under this Part, that the end user did not authorize the Carrier to provide local exchange telecommunications services to the end user (Unauthorized Switching), the Carrier must provide the Company with that end user’s Documentation of Authorization within three (3) business days.

  • However, in the case of unauthorized changes of Requesting Carrier Customers to Ameritech, Ameritech shall also have the duties of the “Carrier” as enumerated in such Resale Tariff, but will pay to Requesting Carrier the Unauthorized Switching Charge described in such Resale Tariff.

  • The Forum was kindly hosted by the Telecommunications Regulatory Authority (TRA) of the United Arab Emirates, in collaboration with the ITU Regional Offices for Arab States and for Africa.

  • However, in the case of unauthorized changes of Urban Media Customers to Ameritech, Ameritech shall also have the duties of the “Carrier” as enumerated in such Resale Tariff, but will pay to Urban Media the Unauthorized Switching Charge described in such Resale Tariff.

  • If Reseller submits an order under this Agreement, and the applicable Customer notifies Ameritech, within the greater of ninety (90) days or two (2) billing cycles of the date Reseller submitted such order, that such Customer did not authorize Reseller to provide Service to such Customer ("Unauthorized Switching"), Reseller shall provide Ameritech with that Customer's Documentation of Authorization within three (3) business days of Ameritech notifying Reseller of such alleged Unauthorized Switching.

  • Further evidence of HIV-1/HIV-2 superinfection [160] and intergroup HIV-1 Group M and O superinfections [161] were also later described, though these cases appear to be rare and more anecdotal, and the focus of this section will be on identification of HIV-1 (intragroup M) superinfections.

  • This title may be cited as the "Prevention of Unauthorized Switching of Customer Natural Gas Accounts Act of 2001".

  • However, in the case of unauthorized changes of RACC Customers to CenturyTel, CenturyTel shall also have the duties of the “Carrier” as enumerated in such Resale Tariff, but will pay the Unauthorized Switching Charge (as described in the Resale Tariff) to RACC.


More Definitions of Unauthorized Switching

Unauthorized Switching is as defined in SECTION 10.11.2(a). ------------------

Related to Unauthorized Switching

  • Unauthorized Use means either of the following:

  • Unauthorized Gas means (a) the quantity of gas taken by Customer exceeding the amount which is permitted during a Period of Interruption or (b) the difference (whether positive or negative) between the quantity of gas taken by Customer and the volumes provided for under an Operational Flow Order.

  • Unauthorized signature means one made without actual, implied, or apparent authority and includes a forgery.

  • Unauthorized Code means any virus, Trojan horse, worm, or other software routines or hardware components designed to permit unauthorized access, to disable, erase, or otherwise harm Software, hardware or data.

  • Unauthorized Access means the entrance of a person into a restricted area without permission of the operator or the operator’s designated representative.

  • Unauthorized alien means an alien as defined in Section 1324a(h)(3) of Title 8 of the United States Code.

  • Unauthorized Third Party means any person or entity that, at the time of the Computer Fraud, is not an Authorized User.

  • Unauthorized person means any person who accesses government data without a work assignment that reasonably requires access, or regardless of the person's work assignment, for a purpose not described in the procedures required by section 13.05, subdivision 5.

  • Unauthorized disclosure or "unauthorized release" means any disclosure or release not permitted by federal or state statute or regulation, any lawful contract or written agreement, or that does not respond to a lawful order of a court or tribunal or other lawful order.

  • Unauthorized Removal means the Contractor’s removal of Key Personnel without the prior written consent of the State.

  • Unauthorized insurer means an insurance institution that has not been granted a certificate of authority by the commissioner to transact the business of insurance in this state."

  • Router means a modem or router provided by us for use by you in connection with the Broadband Service.

  • Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.

  • Malware means any virus, Trojan horse, time bomb, key-lock, spyware, worm, malicious code or other software program designed to or able to, without the knowledge and authorization of the Company or any of its Subsidiaries, disrupt, disable, harm, interfere with the operation of or install itself within or on any Software, computer data, network memory or hardware.

  • Virus means any thing or device (including any software, code, file or programme) which may: prevent, impair or otherwise adversely affect the operation of any computer software, hardware or network, any telecommunications service, equipment or network or any other service or device; prevent, impair or otherwise adversely affect access to or the operation of any programme or data, including the reliability of any programme or data (whether by re-arranging, altering or erasing the programme or data in whole or part or otherwise); or adversely affect the user experience, including worms, trojan horses, viruses and other similar things or devices.

  • Hardware means any and all computer and computer-related hardware, including, but not limited to, computers, file servers, facsimile servers, scanners, color printers, laser printers and networks.

  • Motorized bicycle means any vehicle that either has two tandem wheels or one wheel in the front and two wheels in the rear, that is capable of being pedaled, and that is equipped with a helper motor of not more than fifty cubic centimeters piston displacement that produces no more than one brake horsepower and is capable of propelling the vehicle at a speed of no greater than twenty miles per hour on a level surface.

  • Telecommunications Access Device means that term as defined in Section 219a of the Michigan Penal Code, 1931 PA 328, MCL 750.219a, as may be amended from time to time. As of January 2012, "Telecommunication Access Device" is defined to mean any of the following:

  • Network means the Distributor's lines, substations and associated equipment used to convey electricity between:

  • Devices means (whether physical or virtual) a server, system, workstation, computer, mobile device, or end point upon which or through which the Services are used and/or on which the Software is installed.

  • Connectivity means the provision of a Permanent Separated Bicycle Lane system that reflects desired routes between all major origins and destinations in the city.

  • Unauthorized signature means a signature made without actual, implied, or apparent authority. The term includes a forgery.

  • Routine use means the disclosure of a record without the consent of the subject or subjects, for a purpose which is compatible with the purpose for which the record was collected. It includes disclosures required to be made by statute other than the public records law, Iowa Code chapter 22.

  • Server Software means software that provides services or functionality on a computer acting as a server.

  • Device means instruments, apparatus, and contrivances, including their components, parts, and

  • Customer Materials any materials, data, information, software, equipment or other resources owned by or licensed to You and made available to Us pursuant to facilitating Your use of the Services, including Customer Data.