Protect Route definition

Protect Route means Leased Access (ELA, Wavelength Local Access, and Special Access only) where requested by Customer and available, in which CenturyLink will provide a separate fiber facility path for the protection system between the third party local access provider’s serving wire center and Customer premises. Protect Route uses backup electronics and two physically separate facility paths in the provisioning of the Service. If the working facility or electronics fail, or the Service performance becomes impaired, the facility is designed to automatically switch to the Service protect path in order to maintain a near-continuous flow of information between locations.

Examples of Protect Route in a sentence

  • Protect Route uses backup electronics and two physically separate facility paths in the provisioning of Service.

Related to Protect Route

  • Technological safeguards means the technology and the policy and procedures for use of the technology to protect and control access to personal information.

  • Security Measures has the meaning given in Section 7.1.1 (Google’s Security Measures).

  • Innovative control technology means any system of air pollution control that has not been adequately demonstrated in practice, but would have a substantial likelihood of achieving greater continuous emissions reduction than any control system in current practice or of achieving at least comparable reductions at lower cost in terms of energy, economics, or non-air quality environmental impacts.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Retrenchment means the termination by the employer of the service of a worker for any reason whatsoever, otherwise than as a punishment inflicted by way of disciplinary action, but does not include—

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Protective Measures means appropriate technical and organisational measures which may include: pseudonymising and encrypting Personal Data, ensuring confidentiality, integrity, availability and resilience of systems and services, ensuring that availability of and access to Personal Data can be restored in a timely manner after an incident, and regularly assessing and evaluating the effectiveness of the such measures adopted by it.

  • Restricted network provision means any provision which conditions the payment of benefits, in whole or in part, on the use of network providers.

  • Cabinet x-ray system means an x-ray system with the x-ray tube installed in an enclosure independent of existing architectural structures except the floor on which it may be placed. The cabinet x-ray system is intended to contain at least that portion of a material being irradiated, provide radiation attenuation, and exclude personnel from its interior during generation of radiation. Included are all x-ray systems designed primarily for the inspection of carry-on baggage at airline, railroad, and bus terminals, and in similar facilities. An x-ray tube used within a shielded part of a building, or x-ray equipment that may temporarily or occasionally incorporate portable shielding, is not considered a cabinet x-ray system.

  • Restricted computer software means computer software developed at private expense and that is a trade secret, is commercial or financial and confidential or privileged, or is copyrighted computer software, including minor modifications of the computer software.

  • Physical Safeguards are physical measures, policies, and procedures to protect CONTRACTOR’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.

  • School of cosmetology means an establishment operated for the purpose of teaching cosmetology.

  • Cluster means the Group of exchanges/ cluster of contiguous exchanges.

  • Backsiphonage means the flow of water or other liquids, mixtures or substances into the potable water system from any source other than its intended source, caused by the reduction of pressure in the potable water system.

  • Fence means any structure, wall or barrier, other than a building, erected at grade for the purpose of defining boundaries of property, separating open space, restricting ingress to or egress from property, providing security or protection to property or acting as a visual or acoustic screen.

  • business vertical means a distinguishable component of an enterprise that is engaged in the supply of individual goods or services or a group of related goods or services which is subject to risks and returns that are different from those of the other business verticals.

  • Core Network means the transport infrastructure identified in accordance with Chapter III of Regulation (EU) No 1315/2013;

  • Mobile Network means a 3G or 4G network or any other mobile communications network which we choose to provide Mobile services.

  • COVID-19 Measures means any quarantine, “shelter in place,” “stay at home,” workforce reduction, social distancing, shut down, closure, sequester or any other Law, directive, guidelines or recommendations by any Governmental Authority (including the Centers for Disease Control and the World Health Organization) in each case in connection with, related to or in response to COVID-19, including the Coronavirus Aid, Relief, and Economic Security Act (CARES) or any changes thereto.

  • Indigenous Peoples Safeguards means the principles and requirements set forth in Chapter V, Appendix 3, and Appendix 4 (as applicable) of the SPS;

  • Security System means the building access control system developed by Manager and known as the O.P.E.N.centrix - Open Platform for Essential Networks, which includes, without limitation, the Application Software, the firmware containing the Application Software, the O.P.E.N.cortex platform software and all hardware related thereto;

  • Current significant investigative information means investigative information that a licensing board, after an inquiry or investigation that includes notification and an opportunity for the audiologist or speech-language pathologist to respond, if required by state law, has reason to believe is not groundless and, if proved true, would indicate more than a minor infraction.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Secure Network means a network which is only accessible by Secure Authentication.

  • Interoperability means the ability of a CenturyLink OSS Function to process seamlessly (i.e., without any manual intervention) business transactions with CLEC's OSS application, and vice versa, by means of secure exchange of transaction data models that use data fields and usage rules that can be received and processed by the other Party to achieve the intended OSS Function and related response. (See also Electronic Bonding.)

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.