Switched Access Usage Sample Clauses

Switched Access Usage. VERIZON will provide SPRINT switched access usage records (AURs) in EMI Category 11 format for those UNEs which contain this switched access usage component. SPRINT agrees to follow applicable industry standards for the meet-point billing of switched access usage as defined in MECAB.
AutoNDA by SimpleDocs
Switched Access Usage. GTE will provide Gulf Coast switched access usage records (AURs) in EMI Category 11 format for those UNEs which contain this switched access usage component. Gulf Coast agrees to follow applicable industry standards for the meet-point billing of switched access usage as defined in MECAB. APPENDIX A TO THE UNBUNDLED NETWORK ELEMENTS ATTACHMENT PRICES FOR UNBUNDLED NETWORK ELEMENTS General. The rates contained in this Appendix A are the rates as defined in the UNE Attachment and are subject to change resulting from future Commission or other proceedings, including but not limited to any generic proceeding to determine GTE's unrecovered costs (e.g., historic costs, contribution, undepreciated reserve deficiency, or similar unrecovered GTE costs (including GTE's interim Service Support Surcharge)), the establishment of a competitively neutral universal service system, or any appeal or other litigation. GTE will offer unbundled loops and ports under the following conditions: Interim Universal Service Support Charge. GTE assesses a separate interim universal service fund surcharge for loops and ports to provide continued universal service support that is implicit in GTE’s current retail services prices; and to respect the careful distinctions Congress has drawn between access to UNEs, on the one hand, and the purchase at wholesale rates of GTE services on the other. This surcharge is being addressed (or will be addressed) by the Commission or a court of competent jurisdiction. The parties agree that GTE will offer the port and loop UNEs at the rates set forth below in Appendix A without the interim surcharge, but subject to the following terms and conditions:
Switched Access Usage. Verizon will provide Empire switched access usage records (AURs) in EMI Category 11 format for those UNEs which contain this switched access usage component. Empire agrees to follow applicable industry standards for the meet- point billing of switched access usage as defined in MECAB.
Switched Access Usage. GTE will provide US Dial Tone switched access usage records (AURs) in EMI Category 11 format for those UNEs which contain this switched access usage component. US Dial Tone agrees to follow applicable industry standards for the meet-point billing of switched access usage as defined in MECAB.

Related to Switched Access Usage

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Jointly Provided Switched Access The Parties will use industry standards developed and routing based on the LERG to handle the Provisioning and Billing of Jointly Provided Switched Access (MECAB, MECOD, and the Parties' FCC and state access Tariffs). Each Party will xxxx the IXC the appropriate portion of its Switched Access rates. Qwest will also provide the one-time notification to CLEC of the billing name, billing address and Carrier identification codes of the IXCs subtending any Access Tandem Switches to which CLEC directly connects. This type of traffic is discussed separately in this Section.

  • Jointly Provided Switched Access Services 7.5.1 Jointly Provided Switched Access Service is described and governed by the FCC and state access Tariffs, Multiple Exchange Carrier Access Billing (MECAB) and Multiple Exchange Carrier Ordering and Design (MECOD) Guidelines and based on LERG routing, and is not modified by any provisions of this Agreement. Both Parties agree to comply with such guidelines. CenturyLink and CLEC agree that the originating, intermediate, and terminating LECs for switched access will cooperatively determine the Jointly Provided Switched Access arrangements in which all parties concur.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Local Circuit Switching Capability, including Tandem Switching Capability 4.2.1 Local circuit switching capability is defined as: (A) line-side facilities, which include, but are not limited to, the connection between a loop termination at a main distribution frame and a switch line card; (B) trunk-side facilities, which include, but are not limited to, the connection between trunk termination at a trunk-side cross-connect panel and a switch trunk card; (C) switching provided by remote switching modules; and (D) all features, functions, and capabilities of the switch, which include, but are not limited to: (1) the basic switching function of connecting lines to lines, line to trunks, trunks to lines, and trunks to trunks, as well as the same basic capabilities made available to BellSouth’s customers, such as a telephone number, white page listings, and dial tone; and (2) all other features that the switch is capable of providing, including but not limited to customer calling, customer local area signaling service features, and Centrex, as well as any technically feasible customized routing functions provided by the switch. Any features that are not currently available but are technically feasible through the switch can be requested through the BFR/NBR process.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Interconnection Customer Drawings Within one hundred twenty (120) days after the date of Initial Operation, unless the Interconnection Parties agree on another mutually acceptable deadline, the Interconnection Customer shall deliver to the Transmission Provider and the Interconnected Transmission Owner final, “as-built” drawings, information and documents regarding the Customer Interconnection Facilities, including, as and to the extent applicable: a one-line diagram, a site plan showing the Customer Facility and the Customer Interconnection Facilities, plan and elevation drawings showing the layout of the Customer Interconnection Facilities, a relay functional diagram, relaying AC and DC schematic wiring diagrams and relay settings for all facilities associated with the Interconnection Customer's step-up transformers, the facilities connecting the Customer Facility to the step-up transformers and the Customer Interconnection Facilities, and the impedances (determined by factory tests) for the associated step-up transformers and the Customer Facility. As applicable, the Interconnection Customer shall provide Transmission Provider and the Interconnected Transmission Owner specifications for the excitation system, automatic voltage regulator, Customer Facility control and protection settings, transformer tap settings, and communications.

  • Restricted Access By choosing restricted access, you are requesting that the library restrict access to all full-text copies of your dissertation – both print and electronic – for a specified period of time. Your dissertation will be listed and indexed in the Emory Library Online Catalog and in the ETD repository, but the content, the full text of your thesis or dissertation and any supplementary files, will not be accessible until the expiration of the restricted access period. If you choose to restrict access to the full-text copy of your thesis or dissertation, then you may opt to also restrict access to your abstract or table of contents. You will need to indicate your desire to restrict access to these components of your ETD record during the electronic submission process. If you do not restrict access to your abstract and/or table of contents, then this information will be displayed on the web in the ETD record for your thesis or dissertation even if you have restricted access to the full-text copy. You will be notified by the library sixty ( 60 ) days prior to the expiration of the restricted period that your thesis or dissertation will be published on the internet. It is your responsibility to notify the Graduate School and the library that you need to extend the access restriction, and to provide the library with an updated e- mail address. ☐ 6 months after my graduation ☐ 1 year after my graduation ☐ 2 years after my graduation Please select a time period you would like restricted access below. I request that the full text of my thesis or dissertation (and any supplemental files) be published no sooner than: Part 4 – Inclusion of Previously Copyrighted Material I hereby certify that all text, audio-visual, or other material not created by me or for which I no longer control copyright that is included in my submission (a) has been identified in my submission by quotation, if directly quoted, and with appropriate source citations; and (b) • falls within the parameters of “Fair Use” as defined by US copyright law; or • is unambiguously a part of the public domain as a matter of law; or • is the subject of a properly documented permission obtained from the entity that owns or controls the copyright in the material. I will provide copies of any such permission upon request. Following is a list of the items for which I have sought and received written permission from the copyright owners to include in my submission (attach a separate page if necessary):

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

Time is Money Join Law Insider Premium to draft better contracts faster.