Proper Use of OSS interfaces Sample Clauses

Proper Use of OSS interfaces. 3.4.1 CLEC agrees to utilize SBC MISSOURI electronic interfaces, as described herein, only for the purposes of establishing and maintaining Resale Services, local number portability, interconnection, and UNEs through SBC MISSOURI. In addition, XXXX agrees that such use will comply with SBC MISSOURI’s Data Connection Security Requirements as identified in Section 9 of this Appendix. Failure to comply with such security guidelines may result in forfeiture of electronic access to OSS functionality. In addition, CLEC shall be responsible for and indemnifies SBC MISSOURI against any cost, expense, or liability relating to any unauthorized entry or access into, or use or manipulation of SBC MISSOURI’s OSS from CLEC systems, workstations or terminals or by CLEC employees, agents, or any third party gaining access through information and/or facilities obtained from or utilized by CLEC and shall pay SBC MISSOURI for any and all damages caused by such unauthorized entry.
AutoNDA by SimpleDocs
Proper Use of OSS interfaces. 3.4.1 For AT&T, CLEC agrees to utilize AT&T electronic interfaces, as described herein, only for the purposes of establishing and maintaining Resale Services, UNEs, local number portability and interconnection trunk orders from AT&T pursuant to this Agreement and applicable tariffs. Section 9 of the General Terms and Conditions shall apply to any disputes which arise under this Agreement, with the exception of disputes related to the improper use of or access to CPNI or any alleged non-compliance with AT&T’s security guidelines.
Proper Use of OSS interfaces. 3.2.1 WSP agrees to utilize AT&T-22STATE electronic interfaces, as described herein, solely for the purposes of pre-order and order activity necessary for LNP. In addition, WSP agrees that such use will comply with AT&T-22STATE’s Data Connection Security Requirements as identified in Section 7 of this Attachment. Failure to comply with such security guidelines or misuse of OSS interfaces may result in forfeiture of electronic access to OSS functionality. In addition, WSP shall be responsible for and indemnifies AT&T-22STATE against any cost, expense or liability relating to any unauthorized entry or access into, or use or manipulation of AT&T-22STATE’s OSS from WSP systems, workstations or terminals or by WSP employees, agents, or any third party gaining access through information and/or Facilities obtained from or utilized by WSP and shall pay AT&T-22STATE for any and all damages caused by such unauthorized entry.
Proper Use of OSS interfaces. 3.4.1 CLEC agrees to utilize AT&T electronic interfaces, as described in this attachment, only for the purposes of establishing and maintaining Resale Services or UNEs through AT&T. In addition, XXXX agrees that such use will comply with AT&T’s Data Connection Security Requirements as identified in Section 9.0 of this Attachment. Failure to comply with such security guidelines may result in forfeiture of electronic access to OSS functionality. In addition, CLEC shall be responsible for and indemnifies AT&T against any cost, expense or liability relating to any unauthorized entry or access into, or use or manipulation of AT&T’s OSS from CLEC systems, workstations or terminals or by CLEC employees, agents, or any third party gaining access through information and/or facilities obtained from or utilized by CLEC and shall pay AT&T for any and all damages caused by such unauthorized entry.
Proper Use of OSS interfaces. 3.2.1 For AT&T-13STATE, XXXX agrees to utilize AT&T-13STATE electronic interfaces, as described herein, only for the purposes specifically provided herein. In addition, XXXX agrees that such use will comply with AT&T-13STATE's Data Connection Security Requirements as identified in Section 9 of this Appendix. Failure to comply with such security guidelines may result in forfeiture of electronic access to OSS functionality. In addition, CLEC shall be responsible for and indemnifies AT&T- 13STATE against any cost, expense or liability relating to any unauthorized entry or access into, or use or manipulation of AT&T-13STATE’s OSS from CLEC systems, workstations or terminals or by CLEC employees, agents, or any third party gaining access through information and/or facilities obtained from or utilized by CLEC and shall pay AT&T-13STATE for any and all damages caused by such unauthorized entry.

Related to Proper Use of OSS interfaces

  • Review Systems The Asset Representations Reviewer will maintain and utilize an electronic case management system to manage the Tests and provide systematic control over each step in the Review process and ensure consistency and repeatability among the Tests.

  • Maintaining Records; Access to Properties and Inspections; Maintenance of Ratings (a) Keep proper books of record and account in which full, true and correct entries in conformity with GAAP and all requirements of law are made of all dealings and transactions in relation to its business and activities. Each Loan Party will, and will cause each of its subsidiaries to, permit any representatives designated by the Administrative Agent or any Lender to visit and inspect the financial records and the properties of such Person at reasonable times and as often as reasonably requested and to make extracts from and copies of such financial records, and permit any representatives designated by the Administrative Agent or any Lender to discuss the affairs, finances and condition of such Person with the officers thereof and independent accountants therefor.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • License for Use of Software and Other Intellectual Property Unless expressly prohibited by the licensor thereof or any provision of applicable law, if any, the Borrower hereby grants to the Administrative Agent on behalf of the Secured Parties a limited license to use, without charge, the Borrower’s and the Servicer’s computer programs, software, printouts and other computer materials, technical knowledge or processes, data bases, materials, trademarks, registered trademarks, trademark applications, service marks, registered service marks, service xxxx applications, patents, patent applications, trade names, rights of use of any name, labels, fictitious names, inventions, designs, trade secrets, goodwill, registrations, copyrights, copyright applications, permits, licenses, franchises, customer lists, credit files, correspondence, and advertising materials or any property of a similar nature, as it pertains to the Borrower Collateral, or any rights to any of the foregoing, only as reasonably required in connection with the collection of the Transferred Receivables and the advertising for sale, and selling any of the Borrower Collateral, or exercising of any other remedies hereto, and the Borrower agrees that its rights under all licenses and franchise agreements shall inure to the Administrative Agent’s benefit (on behalf of the Secured Parties) for purposes of the license granted herein. Except upon the occurrence and during the continuation of a Termination Event, the Administrative Agent and the Lenders agree not to use any such license without giving the Borrower prior written notice.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Access to Property Borrower shall permit agents, representatives and employees of Lender to inspect the Property or any part thereof at reasonable hours upon reasonable advance notice.

  • Measurement and Monitoring Tools Contractor shall implement measurement and monitoring tools and procedures reasonably designed to measure its performance of the Services and assess such performance against any applicable service levels. Contractor shall provide LAUSD with a monthly report of service level performance under any applicable Work Order. Upon LAUSD’s request, Contractor shall provide LAUSD with access to the measurement and monitoring tools described herein, and to any information that they generate.

  • Use of Equipment mechanical failure of the equipment; negligent design or manufacture of the equipment; the provision of or the failure by the Organization to provide any warnings, directions, instructions or guidance as to the use of the equipment; failure to use or operate the equipment within my own ability.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

Time is Money Join Law Insider Premium to draft better contracts faster.