Malicious Call Tracing Clause Samples

Malicious Call Tracing. D. 5.1 Any malicious call tracing must be initiated by Royal Bahamas Police Force or an authority empowered to do so by the laws of the Commonwealth of The Bahamas, and tracing that uses the networks of both Parties must be approved by the appropriate person within each Party. Once these approvals have been obtained, a Party shall co-ordinate the call tracing with the NOC of the other Party. The other Party shall give priority to the request.
Malicious Call Tracing. Authorised malicious call tracing may be requested by either of the Party's ISDs and the other Party shall give priority to such a request.
Malicious Call Tracing. Authorised malicious call tracing may be requested by any of the ISDs. Theother Party shall give priority to the request.NUMBERING ALLOCATION AND ROUTING DIVERSITY APPENDIX 4FOR POINT OF INTERCONNECTION 1. INTRODUCTION 3. This Appendix describes the general routing principles, including routing diversity, tobe employed by Vodacom to Telkom as well as the same principles from Telkom to Vodacom. The allocation of CCS No 7 Destination Point codes is also addressed inthe section relating to numbering. 2. ROUTING PRINCIPLES 2.1 Routing from Telkom to VodacomThe catchment areas within the PSTN served by any POI shall be mutually agreed upon between the parties concerned. Calls from within the agreed PSTN catchmentarea will be routed over the PSTN to the appropriate POI in accordance with the PSTN routing plan at not less than the service levels and grade of service agreed to inAppendix 2 section 4.
Malicious Call Tracing. Authorised malicious call tracing may be requested by any of the ISDs. Theother Party shall give priority to the request.6.4.6 Access to PLMN sites housing transmission line terminating equipment.When faults on the transmission links connecting the MSC and POI arereported, MTN agrees to provide access or assistance to Telkom maintenancepersonnel at these sites during testing and repair of the fault. Telkom cannotbe held responsible for long outages due to lack of reasonable access orassistance at the PLMN sites.5.0

Related to Malicious Call Tracing

  • Malicious Software Any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence. Management Charge The sum paid by the Supplier to CCS being an amount of up to 1% but currently set at 0.75% of all Charges for the Services invoiced to Buyers (net of VAT) in each month throughout the duration of the Framework Agreement and thereafter, until the expiry or End of any Call-Off Contract. Management Information The management information specified in Framework Agreement Schedule 6. Material Breach Those breaches which have been expressly set out as a Material Breach and any other single serious breach or persistent failure to perform as required under this Call-Off Contract.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.

  • Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.

  • Intercept Devices 26.1.1.1 Local and federal law enforcement agencies periodically request information or assistance from local telephone service providers. When either Party receives a request associated with an End User of the other Party, it shall refer such request to the Party that serves such End User, unless the request directs the receiving Party to attach a pen register, trap-and-trace or form of intercept on the Party's facilities, in which case that Party shall comply with any valid request.