Allocation and Use of the PEG Access Channel Sample Clauses

Allocation and Use of the PEG Access Channel. The Grantee does not relinquish its ownership of a Channel by designating it for PEG use. However, the PEG Access Channel is, and shall be, operated by the City. The City shall adopt rules and procedures under which Grantee may use the PEG Access Channel for the provision of Video Programming if the PEG Access channel is not being used for its designated purpose(s) pursuant to Section 611(d) of the Cable Act, 47 U.S.C. §531.
AutoNDA by SimpleDocs

Related to Allocation and Use of the PEG Access Channel

  • Allocation and use of scarce resources Any procedures for the allocation and use of scarce resources, including frequencies, numbers and rights of way, will be carried out in an objective, timely, transparent and non-discriminatory manner. The current state of allocated frequency bands will be made publicly available, but detailed identification of frequencies allocated for specific government uses is not required.

  • Cost Responsibility for Interconnection Facilities and Distribution Upgrades 4.1 Interconnection Facilities 4.2 Distribution Upgrades

  • Installation and Use Rights You may install and use any number of copies of the software on your devices.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Provisioning of Line Sharing and Splitter Space 3.2.1 BellSouth will provide ONS with access to the High Frequency Spectrum as follows:

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Modification of the Small Generating Facility The Interconnection Customer must receive written authorization from the NYISO and Connecting Transmission Owner before making any change to the Small Generating Facility that may have a material impact on the safety or reliability of the New York State Transmission System or the Distribution System. Such authorization shall not be unreasonably withheld. Modifications shall be done in accordance with Good Utility Practice. If the Interconnection Customer makes such modification without the prior written authorization of the NYISO and Connecting Transmission Owner, the Connecting Transmission Owner shall have the right to temporarily disconnect the Small Generating Facility. If disconnected, the Small Generating Facility will not be reconnected until the unauthorized modifications are authorized or removed.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code.

  • Distribution of UDP and TCP queries DNS probes will send UDP or TCP “DNS test” approximating the distribution of these queries.

Time is Money Join Law Insider Premium to draft better contracts faster.