Indirect Access Sample Clauses
POPULAR SAMPLE Copied 1 times
Indirect Access. In the event Enrolled Affiliate incurs fees created by instances of indirect access to on-premises Microsoft Server products which the Enrolled Affiliate had no actual knowledge of, Microsoft will work with Government Partner and the Enrolled Affiliate in good faith to determine how to mitigate such fees. Reorganizations, Consolidations, and Privatizations. If the number of Licenses covered by an Enrollment changes by more than ten percent as a result of a reorganization, consolidation, or privatization of any member of the Enterprise, Microsoft will work with Government Partner in good faith to determine how to accommodate the Enterprise’s changed circumstances in the context of these Additional Use Rights and Restrictions. Modification or termination of an Online Service for regulatory reasons. Microsoft may modify or terminate an Online Service in any country or jurisdiction where there is any current or future government requirement or obligation that: (1) subjects Microsoft to any regulation or requirement not generally applicable to businesses operating there; (2) presents a hardship for Microsoft to continue operating the Online Service without modification; and/or (3) causes Microsoft to believe these terms or the Online Service may be in conflict with any such requirement or obligation. Program updates. Microsoft may make a change to the Enterprise and/or Enterprise Subscription programs that will make it necessary for Enrolled Affiliates to enter into a new agreement and Enrollments with Government Partner at the time of an Enrollment renewal. If any such updates occur during a current contract, including option periods, such change(s) will be made at no increase in cost to Enrolled Affiliate: all pricing in the current contract, including contract options will be honored despite any such change(s).
Indirect Access. For indirect access, a directly connected customer of Operator B would use a specific Access Code to access Operator A. Operator B will implement Data Management Amendments into their network so that whenever the code is dialled, it will be recognised and the Call forwarded immediately to the Operator A network, via the nearest point of handover or such other point as is agreed under agreed routing principles. Operator A will pay Operator B for the originating part of the Call. Indirect Access is an optional access method for the end customer. If an Access Code is not used, the Call will be routed via the operator serving that customer (i.e. providing the physical connection). Two variations of this service can be implemented. The first - using ‘A’ number presentation (or Calling Line Identification), where the Caller can instantly be identified as an Operator A customer, and the Call validated. The other type relies on two stage Call set up, where the Caller will be required to enter a Personal Identification Number, which will be validated by Operator A.
Indirect Access. (a) The MOU provides that generally, Newco is responsible for access services, and Indirect Access is a part of access services. FT has however committed to assume responsibility for certain activities and the supply of certain technical features.
(b) FT shall be responsible for the signaling, numbering plan, day to day capacity planning, monitoring and trouble shooting procedures relating to Indirect Access.
(c) FT will be responsible for directing and managing all negotiations with PTOs for Newco for Indirect Access to and will exercise best efforts to have all necessary agreements in place for Indirect Access.
(d) FT shall be responsible for development and implementation of technical solutions necessary to ensure regulatory compliance for existing and future Switched Voice Services (including number portability).
Indirect Access. Indirect Access occurs when humans, devices or systems indirectly access or use the software via another intermediary software or Application Programming Interface (API) between the user and the Licensor’s software. Licenses will not be required for:
a. One-way or two-way access for read-only, write-only or read-and write transactions.
b. Real time, batch transactions or indirect static reads.
c. Accessing the Licensor’s software through one or more intermediary systems, custom front end application or access via other technical interface.
d. Accessing the Licensor’s software via a third-party application or custom front end application that that may or may not activate the Licensor’s software.
Indirect Access. 5.1 The Client shall permit 4SIGHT to attend the Client’s Site to provide any Work Order Services which require physical access, including applicable support and maintenance Services and/or to programme least cost routing into the Client's telephone system to allow access to the Carrier's telephone network.
5.2 The Client shall be responsible for ensuring that the Client’s Equipment maintenance is not jeopardised in any way as a result of requesting and/or receiving the Work Order Services.
Indirect Access. All parties will take measures to prevent unauthorized third-party indirect access to the shared ▇▇▇▇▇▇▇▇ Flex System. Examples of this would be gateways, dial-up, or cascaded Telnet sessions where the originator is not an Authorized Individual of the Server Site’s network, but whose resultant IP address would appear to the network as being an Authorized Individual’s address. Should unauthorized access occur in a manner prohibited in Section 1.4 occur, any damages or costs of litigation including attorney’s fees incurred as a result of such unauthorized access shall be allocated between the parties by the Standards Committee.
