Protective Controls Sample Clauses

Protective Controls. Either Party may use protective network traffic management controls such as 7-digit or 10-digit code gaps, as applicable, on traffic towards each Party’s network, when required to protect the public switched network from congestion or failure, or focused overload. Midcontinent and ILEC will immediately notify each other of any protective control action planned or executed.
AutoNDA by SimpleDocs
Protective Controls. Any Party may use or request protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic to or from each other’s network, when required to protect the public switched network from congestion due to Facility failures, switch congestion, or failure or focused overload. The Parties will immediately notify each other of any protective control action planned or executed.
Protective Controls. Either Party may use protective network traffic management controls such as 7-digit or 10-digit code gaps, as applicable, on traffic towards each Party’s network, when required to protect the public switched network from congestion or failure, or focused overload. Bresnan and UBET will immediately notify each other of any protective control action planned or executed.
Protective Controls. Either Party may use protective network traffic management controls such as 7 and 10 digit code gaps set at appropriate levels on traffic toward each other's network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. MCIm and AT&T ILLINOIS shall immediately notify each other of any protective control action planned or executed.
Protective Controls. Either Party may use protective network traffic management controls as available in their networks such as, but not limited to, 7-digit and 10-digit code gaps, on traffic toward each other's network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. CLC and FairPoint will immediately notify each other of any protective control action planned or executed.

Related to Protective Controls

  • Administrative Controls The Contractor must have the following controls in place:

  • Disclosure Controls The Company and its subsidiaries maintain an effective system of “disclosure controls and procedures” (as defined in Rule 13a-15(e) of the Exchange Act) that complies with the requirements of the Exchange Act and that has been designed to ensure that information required to be disclosed by the Company in reports that it files or submits under the Exchange Act is recorded, processed, summarized and reported within the time periods specified in the Commission’s rules and forms, including controls and procedures designed to ensure that such information is accumulated and communicated to the Company’s management as appropriate to allow timely decisions regarding required disclosure. The Company and its subsidiaries have carried out evaluations of the effectiveness of their disclosure controls and procedures as required by Rule 13a-15 of the Exchange Act.

  • Accounting Controls The Company and its Subsidiaries maintain systems of “internal control over financial reporting” (as defined under Rules 13a-15 and 15d-15 under the Exchange Act Regulations) that comply with the requirements of the Exchange Act and have been designed by, or under the supervision of, their respective principal executive and principal financial officers, or persons performing similar functions, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with GAAP, including, but not limited to, internal accounting controls sufficient to provide reasonable assurance that (i) transactions are executed in accordance with management’s general or specific authorizations; (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with GAAP and to maintain asset accountability; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. Except as disclosed in the Registration Statement, the Pricing Disclosure Package and the Prospectus, the Company is not aware of any material weaknesses in its internal controls. The Company’s auditors and the Audit Committee of the Board of Directors of the Company have been advised of: (i) all significant deficiencies and material weaknesses in the design or operation of internal controls over financial reporting which are known to the Company’s management and that have adversely affected or are reasonably likely to adversely affect the Company’ ability to record, process, summarize and report financial information; and (ii) any fraud known to the Company’s management, whether or not material, that involves management or other employees who have a significant role in the Company’s internal controls over financial reporting.

  • Internal Accounting Controls The Company and each of its subsidiaries maintain a system of internal accounting controls sufficient to provide reasonable assurance that (i) transactions are executed in accordance with management's general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with generally accepted accounting principles and to maintain asset accountability, (iii) access to assets is permitted only in accordance with management's general or specific authorization and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

  • Internal Controls The Company shall maintain a system of internal accounting controls sufficient to provide reasonable assurances that: (i) transactions are executed in accordance with management’s general or specific authorization; (ii) transactions are recorded as necessary in order to permit preparation of financial statements in accordance with GAAP and to maintain accountability for assets; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

Time is Money Join Law Insider Premium to draft better contracts faster.