Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.
Triple Net Lease Landlord and Tenant acknowledge that, to the extent provided in this Lease, it is their intent and agreement that this Lease be a “TRIPLE NET” lease and that as such, the provisions contained in this Lease are intended to pass on to Tenant or reimburse Landlord for the costs and expenses reasonably associated with this Lease, the Building and the Project, and Tenant’s operation therefrom to the extent provided in this Lease. To the extent such costs and expenses payable by Tenant cannot be charged directly to, and paid by, Tenant, such costs and expenses shall be paid by Landlord but reimbursed by Tenant as Additional Rent.
Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.
India As used herein, “
Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.
AT&T 9STATE shall be defined as the States of Alabama, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, South Carolina and Tennessee.
Records Management Records the Provider must keep
SBC-12STATE 47.1.1 The terms contained in this Agreement and any Appendices, Attachments, Exhibits, Schedules, and Addenda constitute the entire agreement between the Parties with respect to the subject matter hereof, superseding all prior understandings, proposals and other communications, oral or written between the Parties during the negotiations of this Agreement and through the execution and/or Effective Date of this Agreement. This Agreement shall not operate as or constitute a novation of any agreement or contract between the Parties that predates the execution and/or Effective Date of this Agreement.
Postoupení Žádná ze smluvních stran nesmí tuto smlouvu postoupit bez souhlasu druhé smluvní strany; avšak za předpokladu, xx xxxxx ze smluvních stran může po vyrozumění druhé smluvní strany postoupit svá práva a povinnosti vyplývající z této smlouvy svému právnímu nástupci v oblasti, na kterou se vztahuje tato smlouva.
General Management In the discharge of its general duty to manage the successful performance of the Services, Vendor shall: