Access Revenues Associated with Ported Numbers Sample Clauses

Access Revenues Associated with Ported Numbers. In accordance with subsection 14.6 of the Agreement
AutoNDA by SimpleDocs

Related to Access Revenues Associated with Ported Numbers

  • Closing Your PayPal Account You can close your account at any time. See the PayPal Help Center for how to do this. We may close your account at our convenience by providing you with two months’ prior notice. We may also close your account at any time if:

  • The OCN, From XXX, and Invoice Number will control the invoice sequencing The From XXX will be used to identify to <<customer_name>> which BellSouth XXX is sending the message. BellSouth and <<customer_name>> will use the invoice sequencing to control data exchange. BellSouth will be notified of sequence failures identified by <<customer_name>> and resend the data as appropriate. THE DATA WILL BE PACKED USING ATIS EMI RECORDS.

  • Unbundled Subloop Distribution (USLD) 2.8.2.1 The USLD facility is a dedicated transmission facility that BellSouth provides from an End User’s point of demarcation to a BellSouth cross-connect device. The BellSouth cross-connect device may be located within a remote terminal (RT) or a stand-alone cross-box in the field or in the equipment room of a building. The USLD media is a copper twisted pair that can be provisioned as a 2-wire or 4-wire facility. BellSouth will make available the following subloop distribution offerings where facilities exist: USLD – Voice Grade (USLD-VG) Unbundled Copper Subloop (UCSL) USLD – Intrabuilding Network Cable (USLD-INC (aka riser cable))

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Closing Your Account Unless an agreement relating to a particular product or service says otherwise, you can close your Account at any time provided that you first settle any debit balance owing.

  • Transmission and Routing of Exchange Access Traffic PURSUANT TO 251(c)(2) 13 5.1 Scope of Traffic 13 5.2 Trunk Group Architecture and Traffic Routing 13 5.3 Logical Trunk Groups 13 5.4 End Office Access 13 ARTICLE VI MEET-POINT BILLING ARRANGEMENTS 14 6.1 Meet-Point Billing Services 14 6.2 Data Format and Data Transfer 14 6.3 Errors or Loss of Access Usage Data 15 6.4 Payment 15 6.5 Additional Limitation of Liability Applicable to Meet-Point Billing Arrangements 16 ARTICLE VII BLV/BLVI TRAFFIC 16

  • Global Access Transport Charges (U S. Bridged): Per-minute per-bridge port usage charges, based on availability of service, zone and origination access type. Bridging charges are additional and are priced at Customer's applicable Toll Meet Meet-Me Access rate per minute. Freephone (IFN) Transport Zone A – G. Discounts:

  • Distribution of UDP and TCP queries DNS probes will send UDP or TCP “DNS test” approximating the distribution of these queries.

  • Xxxxxx et al Case No. 2:16-cv-10277. The Complaint, ECF No. 1, seeks declaratory and injunctive relief under the citizen-suit provision of the Safe Drinking Water Act, 42 U.S.C. § 300j-8(a);

  • Traffic Measurement and Billing over Interconnection Trunks 6.1 For billing purposes, each Party shall pass Calling Party Number (CPN) information on at least ninety-five percent (95%) of calls carried over the Interconnection Trunks.

Time is Money Join Law Insider Premium to draft better contracts faster.