Call Randomizer Sample Clauses

Call Randomizer. IVR functionality will be inserted into call flow to by asking the calling party to enter a randomly generated mutli-digit code to detect if suspected fraudulent call is originating from a person, if affirmed the call will then be terminated to called party, calls not originating from a person will be disconnected. [* * *] The confidential content of this Exhibit 10.2 has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment has been requested with respect to the omitted portions. The above capability may additionally include the capability of these various functions on an end user basis (i.e., to support the call blocking functionality as directed by individual end users of T-Mobile) as mutually agreed by the Parties.
AutoNDA by SimpleDocs

Related to Call Randomizer

  • Anti-Layering The Company shall not incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is subordinate or junior in right of payment to any Senior Debt of the Company and senior in any respect in right of payment to the Notes. No Guarantor shall incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is subordinate or junior in right of payment to the Senior Debt of such Guarantor and senior in any respect in right of payment to such Guarantor's Subsidiary Guarantee.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Distribution Compliance Period The Purchaser agrees not to resell, pledge or transfer any Purchased Shares within the United States or to any U.S. Person, as each of those terms is defined in Regulation S, during the 40 days following the Closing Date.

  • HORIZONR Gateway HORIZONR Gateway provides customers with the ability to (i) generate reports using information maintained on the Multicurrency HORIZONR Accounting System which may be viewed or printed at the customer’s location; (ii) extract and download data from the Multicurrency HORIZONR Accounting System; and (iii) access previous day and historical data. The following information which may be accessed for these purposes: 1) holdings; 2) holdings pricing; 3) transactions, 4) open trades; 5) income; 6) general ledger and 7) cash.

  • Clean-Up Period (a) Notwithstanding any other provision of any Finance Document:

  • Sell-Off Period Notwithstanding expiration or termination of this Agreement, Fig may continue to exercise its rights under the Distribution License for a period of sixty (60) days following expiration or termination, whereupon Fig shall exercise reasonable efforts to terminate any Fig Sales, and to cause any Distributor of Fig to terminate any such sales. Fig shall exercise reasonable efforts to remove or cause any Distributor of Fig to remove from publication or display any advertising relating to the Licensed Game posted by Fig or any such Distributor within the Sell-Off Period.

  • Clean Up Call In addition to the Sellers’ rights pursuant to Section 1.3, the Sellers shall have the right, upon two Business Days’ prior written notice to the Agent and the Purchasers, at any time following the reduction of the Aggregate Capital to a level that is less than 20.0% of the Purchase Limit hereunder, to repurchase from the Purchasers all, but not less than all, of the then outstanding Purchaser Interests. The purchase price in respect thereof shall be an amount equal to the Aggregate Unpaids (including any Broken Funding Costs arising as a result of such repurchase) through the date of such repurchase, payable in immediately available funds. Such repurchase shall be without representation, warranty or recourse of any kind by, on the part of, or against any Purchaser or the Agent.

  • Settlement Averaging Period For any Option and regardless of the Settlement Method applicable to such Option:

  • Sales During Pre-Settlement Period Notwithstanding anything herein to the contrary, if at any time on or after the time of execution of this Agreement by the Company and an applicable Purchaser, through, and including the time immediately prior to the Closing (the “Pre-Settlement Period”), such Purchaser sells to any Person all, or any portion, of any shares of Common Stock to be issued hereunder to such Purchaser at the Closing (collectively, the “Pre-Settlement Shares”), such Purchaser shall, automatically hereunder (without any additional required actions by such Purchaser or the Company), be deemed to be unconditionally bound to purchase, and the Company shall be deemed unconditionally bound to sell, such Pre-Settlement Shares to such Purchaser at the Closing; provided, that the Company shall not be required to deliver any Pre-Settlement Shares to such Purchaser prior to the Company’s receipt of the purchase price of such Pre-Settlement Shares hereunder; and provided further that the Company hereby acknowledges and agrees that the forgoing shall not constitute a representation or covenant by such Purchaser as to whether or not during the Pre-Settlement Period such Purchaser shall sell any shares of Common Stock to any Person and that any such decision to sell any shares of Common Stock by such Purchaser shall solely be made at the time such Purchaser elects to effect any such sale, if any.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Time is Money Join Law Insider Premium to draft better contracts faster.