AT&T-ASI Sample Clauses

AT&T-ASI. 13 State will not be liable for any Loss or damage resulting from any cause beyond AT&T-ASI/13 State’s reasonable control, such as, but not limited to, fire, explosion, lightning, flood, earthquake, power surges or failures, strikes or labor disputes, floods, storms, tornadoes, acts of war, civil disturbances, acts of civil or military authorities or the public enemy, delays caused by CLEC, Customer Equipment or CLEC service or equipment vendors or any other cause beyond AT&T-ASI/13 State’s control.
AutoNDA by SimpleDocs
AT&T-ASI. 13 State will make a best effort attempt to notify the CLEC of each missed repair commitment through a status call.
AT&T-ASI. 13 State will provide CLEC with the same provisioning intervals and procedures for RLAN Transport Services that it provides to AT&T-ASI/13 State End Users. AT&T-ASI/13 State will provide non-discriminatory access to the same pre-ordering loop information employed by AT&T-ASI/13 State.

Related to AT&T-ASI

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • Transmission and Routing of Exchange Access Traffic PURSUANT TO 251(c)(2) 13 5.1 Scope of Traffic 13 5.2 Trunk Group Architecture and Traffic Routing 13 5.3 Logical Trunk Groups 13 5.4 End Office Access 13 ARTICLE VI MEET-POINT BILLING ARRANGEMENTS 14 6.1 Meet-Point Billing Services 14 6.2 Data Format and Data Transfer 14 6.3 Errors or Loss of Access Usage Data 15 6.4 Payment 15 6.5 Additional Limitation of Liability Applicable to Meet-Point Billing Arrangements 16 ARTICLE VII BLV/BLVI TRAFFIC 16

  • Bundled Services If Cable Services subject to the Franchise Fee required under this Section 6 are provided to Subscribers in conjunction with Non-Cable Services, the Franchise Fee shall be applied only to the value of the Cable Services, as reflected on the books and records of Franchisee in accordance with FCC or state public utility regulatory commission rules, regulations, standards or orders.

  • Hosted Services We shall use commercially reasonable efforts to make the Hosted Services you have purchased available 24 hours a day, 7 days a week, except for: (a) planned downtime under our direct control (of which we shall give at least 8 hours notice via the Hosted Services and which we shall schedule to the extent practicable during the weekend hours from 6:00 p.m. Pacific time Friday to 3:00 a.m. Pacific time Monday), (b) to the extent we are notified by third party service providers of planned downtime (of which we shall provide such notice to you via the Hosted services as soon we can reasonably do so), or (c) any unavailability caused by circumstances beyond our reasonable control, including, without limitation, acts of God, acts of government, flood, fire, earthquakes, civil unrest, acts of terror, strikes or other labor problems, internet service or third party hosting provider failures or delays ("Force Majeure"). Hosted Services are provided in accordance with applicable laws and government regulations.

  • Tandem Switched Transport 7.3.4.2.1 For traffic delivered through a CenturyLink or CLEC tandem Switch (as defined in the Agreement), the Parties agree that, because this State is a new market for CLEC, tandem switched transport functions for Exchange Service (EAS/Local) non-transit traffic shall be compensated based upon the xxxx and keep compensation mechanism. Xxxx and keep will apply to both the tandem switching rate and the tandem transmission rate. Xxxx and keep shall govern compensation for such traffic exchanged by the Parties in this State until the earlier of: (1) the expiration of the Agreement, or (2) further action by the Federal Communications Commission (FCC), or a court of competent jurisdiction, vacates, replaces, modifies, or supersedes the applicable rules adopted in Order on Remand and Report and Order, CC Docket Nos. 96-98, 00-00, XXX 00-000 (xxx. Apr. 27, 2001). 7.3.4.2.2 Intentionally Left Blank.

  • Tandem Switching 4.3.1 The Tandem Switching capability Network Element is defined as: (i) trunk- connect facilities, which include, but are not limited to, the connection between trunk termination at a cross connect panel and switch trunk card; (ii) the basic switch trunk function of connecting trunks to trunks; and (iii) the functions that are centralized in the Tandem Switches (as distinguished from separate end office switches), including but not limited to call recording, the routing of calls to operator services and signaling conversion features.

  • Software Ownership Upon request, the State and all appropriate federal agencies shall receive a royalty-free, nonexclusive, and irrevocable license to reproduce, publish, or otherwise use, and to authorize others to do so, all application software produced in the performance of this Agreement, including, but not limited to, all source, object, and executable code, data files, and job control language, or other system instructions. This requirement applies only to software that is a specific deliverable under this Agreement, or is integral to the program or service funded under this Agreement, and is primarily financed with funding provided under this Agreement.

  • Local Switching Interfaces 4.2.13.1 Newcomm shall order ports and associated interfaces compatible with the services it wishes to provide as listed in Exhibit A. BellSouth shall provide the following local switching interfaces:

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • enabled This information is collected by Symantec for the purpose of providing protection and of evaluating and advising You regarding potential threats and risks that may be associated with a particular Web site before You view it. − Executable files and files that contain executable content that are identified as potential malware, including information on the actions taken by such files at the time of installation. These files are submitted to Symantec using the Software and Service’s automatic submission function. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products. The collected files could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec’s products to detect malicious behavior. − The name given to the Device during the initial setup of such Device. If collected, the name will be used by Symantec as an account name for the Device under which You may elect to receive additional services and/or under which You may use certain features of the Software and Services. You may change such account name at any time after installation of the Software and Services and it is recommended that You do so. − Status information regarding installation and operation of the Software and Services. This information indicates to Symantec whether installation of the Software and Services was successfully completed as well as whether the Software and Services has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folder encountered by the Software and Services at the time of installation or error. The status information is collected by Symantec for the purpose of evaluating and improving Symantec’s product performance and installation success rate. Symantec may also use this information to optimize its web-pages. − Information contained in email messages that You send through the Software and Services to Symantec to report as spam or as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with Your permission, and will not be sent automatically. If You send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantec’s antispam technology. Symantec will not correlate or match up these files with any other personally identifiable information. − Information contained in a report that You may choose to send through the Software and Services to Symantec when the Software and Services encounters a problem. The report includes information regarding the status of both the Software and Services and Your Device at the time that the Software and Services encountered the problem. The status information about Your Device may include the system language, country locale, and the operating system version for Your Device, as well as the processes running, their status and performance information, and data from files or folders that were open at the time the Software and Services encountered the problem. The information could contain personally identifiable information if such information is included in, or is a part of the name of the files or folders open at the time the Software and Services encountered the problem. This information will be sent to Symantec only with Your permission, and will not be sent automatically. The information is collected by Symantec for the purpose of correcting the encountered problem and improving Symantec’s product performance. This information will not be correlated or matched up with any personally identifiable information. − The Internet Protocol (IP) address and/or Media Access Control (MAC) address and the Machine ID of the Device on which the Software and Services is installed to enable the Software and Services to function and for license administration purposes. − Other general, statistical information used for product analysis, and for improving product functionality. Unless it is expressly defined as optional, the collected information as set out above is necessary for the purpose of the functionality of Symantec’s products. Information may be transferred to the Symantec group in the United States or other countries that may have less protective data protection laws than the region in which You are situated (including the European Union) and may be accessible by Symantec employees or contractors exclusively to be used in accordance with the purposes described above. For the same purposes the information may be shared with partners and vendors that process information on behalf of Symantec. Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection. Subject to applicable laws, Symantec reserves the right to cooperate with any legal process and any law enforcement or other government inquiry related to Your use of this Software and Services. This means that Symantec may provide documents and information relevant to a court subpoena or to a law enforcement or other government investigation. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software and Services, You acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze such information for these purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.