Microwave Physical Collocation Application Sample Clauses

Microwave Physical Collocation Application. Teligent shall submit the appropriate collocation application fee and form pursuant to USWC’s EICT or other applicable tariff, in addition to a Microwave Physical Collocation Application Form (a form of which is set forth as Attachment 2, Appendix B to this Agreement) for each central office building where Teligent seeks Microwave Physical Collocation. The forms and fees will apply both to space on the roof as well as space inside the USWC central office. Within fifteen (15) days of receiving a collocation application USWC shall inform Teligent (i) if space is available inside the central office for termination equipment and (ii) if space is available on the roof, parapet, or other exterior structures. If USWC concludes that rooftop/exterior space which provides Teligent with unobstructed line-of-sight does not appear to be technically feasible, USWC will provide Teligent with a written explanation of such technical infeasibility within fifteen (15) days of USWC’s receipt of the collocation application.
AutoNDA by SimpleDocs

Related to Microwave Physical Collocation Application

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Maintaining Records; Access to Properties and Inspections; Maintenance of Ratings (a) Keep proper books of record and account in which full, true and correct entries in conformity with GAAP and all requirements of law are made of all dealings and transactions in relation to its business and activities. Each Loan Party will, and will cause each of its subsidiaries to, permit any representatives designated by the Administrative Agent or any Lender to visit and inspect the financial records and the properties of such Person at reasonable times and as often as reasonably requested and to make extracts from and copies of such financial records, and permit any representatives designated by the Administrative Agent or any Lender to discuss the affairs, finances and condition of such Person with the officers thereof and independent accountants therefor.

  • Site Visits and Inspections; Regulatory Examinations During the term of this Agreement, authorized representatives of the Fund may conduct periodic site visits of the Transfer Agent’s facilities and inspect the Transfer Agent’s records and procedures solely as they pertain to the Transfer Agent’s services for the Fund under or pursuant to this Agreement. Such inspections shall be conducted at the Fund’s expense (which shall include costs related to providing materials, copying, faxing, retrieving stored materials, and similar expenses) and shall occur during the Transfer Agent’s regular business hours and, except as otherwise agreed to by the parties, no more frequently than twice a year. In connection with such site visit and/or inspection, the Fund shall not attempt to access, nor will it review, the records of any other clients of the Transfer Agent and the Fund shall conduct the visit/inspection in a manner that will not interfere with the Transfer Agent’s normal and customary conduct of its business activities, including the provision of services to the Fund and to other clients. The Transfer Agent shall have the right to immediately require the removal of any Fund representatives from its premises in the event that their actions, in the reasonable opinion of the Transfer Agent, jeopardize the information security of its systems and/or other client data or otherwise are disruptive to the business of the Transfer Agent. The Transfer Agent may require any persons seeking access to its facilities to provide reasonable evidence of their authority. The Transfer Agent may also reasonably require any of the Fund’s representatives to execute a confidentiality agreement before granting such individuals access to its facilities. The Transfer Agent will also provide reasonable access to the Fund’s governmental regulators, at the Fund’s expense, solely to (i) the Fund’s records held by the Transfer Agent and (ii) the procedures of the Transfer Agent directly related to its provision of services to the Fund under the Agreement.

  • Agreements Regarding Collateral and Field Examination Reports (ll) Lien Releases;

  • Annual Collateral Verification Each year, at the time of delivery of annual financial statements with respect to the preceding Fiscal Year pursuant to Section 5.1(c), Company shall deliver to Collateral Agent a certificate of an Authorized Officer either (i) confirming that there has been no change in such information since the date of the Collateral Questionnaire delivered on the Closing Date or the date of the most recent certificate delivered pursuant to this Section 5.1(o) or (ii) identifying such changes;

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Information Systems Acquisition Development and Maintenance Security of System Files. To protect City Information Processing Systems and system files containing information, Service Provider will ensure that access to source code is restricted to authorized users whose specific job function necessitates such access.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

Time is Money Join Law Insider Premium to draft better contracts faster.