Transit Traffic 7.2.2.3.1 CenturyLink will accept traffic originated by CLEC’s network and/or its end user(s) for termination to other Telecommunications Carrier’s network and/or its end users that is connected to CenturyLink's Switch. CenturyLink will also terminate traffic from these other Telecommunications Carriers’ network and/or its end users to CLEC’s network and/or its end users. For purposes of the Agreement, transit traffic does not include traffic carried by Interexchange Carriers. That traffic is defined as Jointly Provided Switched Access. 7.2.2.3.2 The Parties involved in transporting transit traffic will deliver calls to each involved network with CCS/SS7 protocol and the appropriate ISUP/TCAP messages to facilitate full Interoperability and Billing functions. 7.2.2.3.3 The originating company is responsible for payment of appropriate rates to the transit company and to the terminating company. The Parties agree to enter into traffic exchange agreements with third party Telecommunications Carriers prior to delivering traffic to be transited to third party Telecommunications Carriers. In the event one Party originates traffic that transits the second Party’s network to reach a third party Telecommunications Carrier with whom the originating Party does not have a traffic exchange agreement, then the originating Party will indemnify, defend and hold harmless the second Party against any and all charges levied by such third party Telecommunications Carrier, including any termination charges related to such traffic and any attorneys fees and expenses. In the case of IntraLATA LEC Toll traffic where CenturyLink is the designated IntraLATA Toll provider for existing LECs, CenturyLink will be responsible for payment of appropriate usage rates. 7.2.2.3.4 When CenturyLink receives an unqueried call from CLEC to a telephone number that has been ported to another local services provider, the transit rate will apply in addition to any query rates. 7.2.2.3.5 In the case of a transit call that terminates in the Local Calling Area but in a different state than the call originated, and the CLEC does not have an agreement with CenturyLink in the state where the transit call terminated, CLEC must execute an agreement for that state if it is a state served by CenturyLink. In the absence of a second agreement, the transit rate in Exhibit A of this Agreement will be billed to the CLEC.
Load Shedding The Distributor may carry out Load Shedding in the following circumstances: (a) Maintenance of Network equipment: if the Distributor wishes to inspect or effect alterations, maintenance, repairs, or additions to any part of the Network, subject to clauses 4.6, 4.8, 4.10, and Schedule 5 as applicable; (b) Permitted by Service Standards: as permitted by the Service Standards, if the Customer has elected to receive an interruptible or otherwise non-continuous supply of electricity; (c) Compliance with instructions from the System Operator: (i) to comply with a request or instruction received from the System Operator in accordance with the Code; or (ii) if communication with the System Operator has been lost, and the Distributor reasonably believes that, had communication with the System Operator been maintained, the Distributor would have received a request or instruction from the System Operator to shed load in accordance with the Code; (d) Maintain security and safety: to maintain the security and safety of the Network in order to: (i) maintain a safe environment, consistent with the Distributor's health and safety policies; (ii) prevent unexpected short term overloading of the Network; (iii) prevent voltage levels rising or falling outside of legal requirements; (iv) manage System Security; and (v) avoid or mitigate damage to the Network or any equipment connected to the Network; (e) Compliance with the Code: to comply with the Code or the law; or (f) Other circumstances: for any other purpose that, in the Distributor’s reasonable opinion, and in accordance with Good Electricity Industry Practice, requires the interruption or reduction of delivery of electricity to any ICP.
Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.