Unauthorized Carrier Change Charges Sample Clauses

Unauthorized Carrier Change Charges. In the event either Party requests that the other Party install, provide, change, or terminate a Customer’s Telecommunications Service (including, but not limited to, a Customer’s selection of a primary Telephone Exchange Service Provider) without having obtained authorization from the Customer for such installation, provision, selection, change or termination in accordance with Applicable Laws, the requesting Party shall be liable to the other Party for all charges that would be applicable to the Customer for the initial change in the Customer’s Telecommunications Service and any charges for restoring the Customer’s Telecommunications Service to its Customer-authorized condition (all such charges together, the “Carrier Change Charges”), including to the appropriate primary Telephone Exchange Service provider. Such Carrier Change Charges may be assessed on the requesting Party by the other Party at any time after the Customer is restored to its Customer-authorized condition.
AutoNDA by SimpleDocs
Unauthorized Carrier Change Charges. In the event either Party requests that the other Party install, provide, change, or obtained authorization from the Customer for such installation, provision, selection, change or termination in accordance with Applicable Laws, the requesting Party shall be liable to the other Party for all charges allowed under the FCC rules. Such Carrier Change Charges may be assessed on the requesting Party by the other Party at any time after the Customer is restored to its Customer-authorized condition.
Unauthorized Carrier Change Charges. In the event iNetworks requests that Verizon install, provide, change, or terminate a Reseller Customer’s Telecommunications Service (including, but not limited to, a Reseller Customer’s selection of a primary Telephone Exchange Service Provider) without having obtained authorization from the Reseller Customer for such installation, provision, selection, change or termination in accordance with Applicable Laws, iNetworks shall be liable to Verizon for all charges that would be applicable to the Reseller Customer for the initial change in the Reseller Customer’s Telecommunications Service and any charges for restoring the Reseller Customer’s Telecommunications Service to its Reseller Customer-authorized condition (all such charges together, the “Carrier Change Charges”), including to the appropriate primary Telephone Exchange Service provider. Such Carrier Change Charges may be assessed on iNetworks by Verizon at any time after the Reseller Customer is restored to its Reseller Customer-authorized condition.
Unauthorized Carrier Change Charges. In the event either Party requests that the other Party install, provide, change, or cations Service (including, but not limited to, a obtained authorization from the Customer for such installation, provision, selection, change or termination in accordance with Applicable Laws, the requesting Party shall be liable to the other Party for all charges that would be applicable to the Customer for the mmunications Service to its Customer-authorized appropriate primary Telephone Exchange Service provider. Such Carrier Change Charges may be assessed on the requesting Party by the other Party at any time after the Customer is restored to its Customer-authorized condition.
Unauthorized Carrier Change Charges. In the event either Party requests that the other Party install, provide, change, or terminate a Customer’s Telecommunications Service (including, but not limited to, a Customer’s selection of a primary Telephone Exchange Service Provider) without having obtained authorization from the Customer for such installation, provision, selection, change or termination in accordance with Applicable Laws, the requesting Party shall be liable to the other Party for all amounts owed to that other Party based on that other Party’s remedies under Applicable Law (including, but not limited to, 47 C.F.R. §§ 1140 and 1170).

Related to Unauthorized Carrier Change Charges

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act (8 U.S.C.A. & 1101, et seq.), as amended; and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this contract, and should the Federal Government impose sanctions against the City for such use of unauthorized aliens, Consultant hereby agrees to, and shall, reimburse City for the cost of all such sanctions imposed, together with any and all costs, including attorneys' fees, incurred by the City in connection therewith.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Line Information Database 9.1 LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, Triarch Marketing must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

Time is Money Join Law Insider Premium to draft better contracts faster.