MG Overload Control Sample Clauses

MG Overload Control. Rate limitation of H.248 Messages from MGC-to-MG <SAME as in “ETSI_BGF/2”>
AutoNDA by SimpleDocs

Related to MG Overload Control

  • Fraud Control BellSouth will provide seven days per week, 24-hours per day, fraud monitoring on Calling Cards, xxxx-to-third and collect calls made to numbers in BellSouth’s LIDB, provided that such information is included in the LIDB query. BellSouth will establish fraud alert thresholds and will notify <<customer_name>> of fraud alerts so that <<customer_name>> may take action it deems appropriate.

  • Weed Control The tenant shall control all noxious weeds on the subject lands and maintain all summerfallow in a reasonably weed-free condition.

  • Overload A regular employee who works an overload in a given year shall receive no less than either:

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Overload Teaching Paragraph 1: Overload teaching is that teaching conducted by a full-time classroom teacher teaching daily in a vacant position during his/her planning period.

  • Causes Beyond Control Neither party of this contract shall be held responsible for delay or default caused by fire, riot, acts of God, sovereign, public enemy, and/or war which is beyond that party's control. The STATE may terminate this contract upon written notice after determining such delay or default will reasonably prevent successful performance of the contract. In the event a cause or causes beyond control impact this contract, the STATE may grant a reasonable extension of time and shall not additionally compensate the PURCHASER.

  • Traffic Measurement and Billing over Interconnection Trunks 6.1 For billing purposes, each Party shall pass Calling Party Number (CPN) information on at least ninety-five percent (95%) of calls carried over the Interconnection Trunks.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Noise Control The use of sound equipment is prohibited unless approved by Management. Any electronic equipment or machinery which is determined to be distracting to other exhibits will not be permitted.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Time is Money Join Law Insider Premium to draft better contracts faster.