Access Technology Sample Clauses

Access Technology. Discuss the access technologies that MPLS services are currently generally available on (non-ICB). Describe the service offering in terms of availability and service features as well as technologies employed, i.e., MLPPP, NxT1, etc.
AutoNDA by SimpleDocs
Access Technology. For the delivery of IP VPN CoS, tw telecom will perform different treatments based on the access method that the customer connects to the IP VPN edge (Xxxx/PE). The access has been broken down into three separate categories:  TDM T1  TDM DS-3 and above  Metro Ethernet

Related to Access Technology

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you. [ ] List here previous Inventions which you desire to have specifically excluded from the operation of this Agreement. Continue on reverse side if necessary.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Licensed Technology The term “Licensed Technology” shall mean the Licensed Patent Rights, Licensed Know-How and Licensed Biological Materials.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Third Party Technology Customer is hereby notified that third parties have licensed certain technology to Company, which is contained in the Software. Notwithstanding anything herein to the contrary, Customer hereby consents to the disclosure of Customer’s identity, and such other terms of this Agreement as necessary, to such third party licensors for the purpose of enabling Company to comply with the terms and conditions of such third party licenses. Any such Customer information will be provided pursuant to an obligation of confidentiality and nondisclosure at least as stringent as that imposed by this Agreement.

  • Licensed Materials The materials that are the subject of this Agreement are set forth in Appendix A ("Licensed Materials").

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

Time is Money Join Law Insider Premium to draft better contracts faster.