Traffic Types Sample Clauses

Traffic Types. The Traffic Types to be exchanged under this Agreement include:
AutoNDA by SimpleDocs
Traffic Types. 13 5.3 TYPES OF EXCHANGED TRAFFIC. . . . . . . . . . . . . . . . . . . . . . . . 14 5.4 RATE STRUCTURE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 5.5 LIS INTERFACE CODE AVAILABILITY AND OPTIONAL FEATURES . . . . . . . . . . 18 5.6 MEASURING LOCAL INTERCONNECTION MINUTES . . . . . . . . . . . . . . . . . 19 5.7 TESTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 5.8 ORDERING. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 5.9 BILLING ARRANGEMENTS. . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Traffic Types. Traffic Exchange Trunk Groups shall be used by the Parties exclusively to transmit Reciprocal Compensation Traffic, Transit Traffic and Switched Access Traffic between their networks. The Parties mutually acknowledge that the types of traffic provided for under the Agreement do not include all types of traffic that either Party may lawfully carry and exchange with the other Party. Each Party reserves the right to request interconnection arrangements for any type of telecommunications traffic not within the scope of the Agreement, and the other Party, upon receiving such a request, shall negotiate in good faith to establish such arrangements consistent with the provisions of the Act. Any such arrangements shall be governed either by an amendment to the Agreement or by a separate agreement between the Parties.

Related to Traffic Types

  • Terrorism Sanctions Regulations The Company will not and will not permit any Subsidiary to (a) become a Person described or designated in the Specially Designated Nationals and Blocked Persons List of the Office of Foreign Assets Control or in Section 1 of the Anti-Terrorism Order or (b) engage in any dealings or transactions with any such Person.

  • OFAC; Sanctions None of Southwest, any Southwest Entity or any director or officer or, to the Knowledge of Southwest, any agent, employee, affiliate or other Person acting on behalf of any Southwest Entity (a) engaged in any services (including financial services), transfers of goods, software, or technology, or any other business activity related to (i) Cuba, Iran, North Korea, Sudan, Syria or the Crimea region of Ukraine claimed by Russia (“Sanctioned Countries”), (ii) the government of any Sanctioned Country, (iii) any person, entity or organization located in, resident in, formed under the laws of, or owned or controlled by the government of, any Sanctioned Country, or (iv) any Person made subject of any sanctions administered or enforced by the United States Government, including, without limitation, the list of Specially Designated Nationals (“SDN List”) of the U.S. Department of the Treasury’s Office of Foreign Assets Control (“OFAC”), or by the United Nations Security Council, the European Union, Her Majesty’s Treasury, or other relevant sanctions authority (collectively, “Sanctions”), (b) engaged in any transfers of goods, technologies or services (including financial services) that may assist the governments of Sanctioned Countries or facilitate money laundering or other activities proscribed by United States Law, (c) is a Person currently the subject of any Sanctions or (d) is located, organized or resident in any Sanctioned Country.

  • Customer Remittances Obligors of the Receivables will be directed by AmeriCredit to forward their remittances to Processor at a post office address (the “Lockbox”) assigned by Processor. Processor, acting for the exclusive benefit of the Trustee, shall have unrestricted and exclusive access to the mail directed to this address. AmeriCredit agrees to notify Processor thirty (30) days in advance of any change in Obligor remittance statements and/or mailing schedule.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Export Control This Agreement is made subject to any restrictions concerning the export of products or technical information from the United States or other countries that may be imposed on the Parties from time to time. Each Party agrees that it will not export, directly or indirectly, any technical information acquired from the other Party under this Agreement or any products using such technical information to a location or in a manner that at the time of export requires an export license or other governmental approval, without first obtaining the written consent to do so from the appropriate agency or other governmental entity in accordance with Applicable Law.

  • Data Loss Prevention Transfer Agent shall implement a data leakage program that is designed to identify, detect, monitor and document Fund Data leaving Transfer Agent’s control without authorization in place.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • Anti-Terrorism The Contractor agrees to undertake all reasonable efforts to ensure that none of the UNDP funds received under the Contract is used to provide support to individuals or entities associated with terrorism and that recipients of any amounts provided by UNDP hereunder do not appear on the list maintained by the Security Council Committee established pursuant to Resolution 1267 (1999). The list can be accessed via xxxxx://xxx.xx.xxx/sc/suborg/en/sanctions/1267/aq_sanctions_list. This provision must be included in all sub-contracts or sub-agreements entered into under the Contract.

  • Monthly Data Download Not later than fifteen (15) days after the end of each month, beginning with the month in which the Commencement Date occurs and ending with the Final Shared-Loss Month, Assuming Institution shall provide Receiver:

Time is Money Join Law Insider Premium to draft better contracts faster.