USER TRAFFIC Sample Clauses

USER TRAFFIC. POC will use reasonable commercial efforts to ensure that end user traffic linked from the Customized Service to the POC Website is either kept within the POC Website or channeled back to the Customized Service and/or the POC Website. CompuServe and POC shall cooperate in the implementation of mutually acceptable links from the POC Website to the Customized Service.
AutoNDA by SimpleDocs

Related to USER TRAFFIC

  • Transit Traffic The following rates will apply:

  • Local Traffic Traffic that is originated by a Customer of one Party on that Party’s network and terminates to a Customer of the other Party on that other Party’s network within Verizon's then current local calling area (including non-optional local calling scope arrangements) as defined in Verizon’s effective Customer Tariffs. A non- optional local calling scope arrangement is an arrangement that provides Customers a local calling scope (Extended Area Service, “EAS”), beyond their basic exchange serving area. Local Traffic does not include optional local calling scope traffic (i.e., traffic that under an optional rate package chosen by the Customer terminates outside of the Customer’s basic exchange serving area). IntraLATA calls originated on a 1+ presubscription basis, or on a casual dialed (10XXX/101XXXX) basis are not considered Local Traffic. Local Traffic does not include any Internet Traffic.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

  • User Content Certain areas of the Platform may enable you to post comments, send messages, correspond with others and/or otherwise post content (“User Content”) in connection with various features that Spectra may elect to offer, such as information libraries, e-mail service, bulletin boards, chatrooms, electronic postcards, chats with special guests, e-mails, and forums to communicate with others (“Message Features”). You must use the Message Features in a responsible manner and you are fully responsible for all User Content that you provide to us or others. Your License to Us. By submitting User Content, you grant us and our designees a royalty-free, irrevocable, perpetual, non-exclusive, worldwide, fully sub-licensable, transferable, license to publish, reproduce, distribute, display, perform, edit, adapt, modify, translate, create derivative works, make, sell, offer for sale, export, and otherwise use and exploit your User Content (or any portion thereof) in any way that we want and in any form, media, or technology now known or later developed. You hereby waive any moral rights you may have in your User Content in favor of Spectra and any of its designees. You represent that you have obtained all necessary permissions necessary to grant us those rights, including from any person identified in or implicated by your submission (including those shown in photographic content), and, in the case of minors, also from their parents or legal guardians, as appropriate. No Obligation to Publish. We are not obligated to publish, transmit or use your User Content. Spectra is not in any manner endorsing any User Content that it may publish or post on the Platform and cannot, and will not, vouch for its reliability. Spectra is not responsible for any User Content and has no duty to monitor User Content. You use any information contained in User Content at your own risk. Spectra and its designees have the right, in their sole discretion, to monitor, review, edit, remove, delete, disable, refuse, restrict, or terminate access to your User Content or the Platform (in whole or in part) at any time, without prior notice and in our sole discretion, for any or no reason. The obligations that you have to us under these Terms shall survive termination of the Platform, any use by you of the Platform, any User Content on the Platform, or these Terms. You will not continue to post any User Content that Spectra has previously advised you not to post.

  • Traffic The provisions in this Section apply regardless how the ISP-bound traffic is determined.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Internet Traffic Any traffic that is transmitted to or returned from the Internet at any point during the duration of the transmission.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

Time is Money Join Law Insider Premium to draft better contracts faster.