IT SOLUTIONS Sample Clauses

IT SOLUTIONS. 2.1 This Contract governs the overall relationship of the SERVICE PROVIDER and the CUSTOMER with respect to the provision of the Ordered IT Solutions. The CUSTOMER has ordered the Ordered IT Solutions specified in Schedule 2-2 and the SERVICE PROVIDER shall provide those Ordered IT Solutions:
AutoNDA by SimpleDocs
IT SOLUTIONS. 3.1. Each of the IT Solutions specified in Schedule 3 of this Framework Agreement shall be subject to ITPS Approval. IT Solutions that are approved will be shown as a Catalogue Entry and shall be made available to Customers. When a specific IT Solution is the subject of an Order by a Customer, it will be referred to in the ensuing Contract as an Ordered IT Solution. The SERVICE PROVIDER must provide the Sprint II Website for Customers to place Orders for IT Solutions. Such Sprint II Website must allow Customers to complete the information set out in Annex A of Schedule 6. The SERVICE PROVIDER must also permit Customers to place Orders for IT Solutions via their own internal purchasing system.
IT SOLUTIONS. At present ICBS provides microdata to researchers using three different IT solutions depending on the type of data. Research rooms – for ’research room files’ and currently also for ‘MUC’ files ICBS have research rooms located in Jerusalem, Tel Aviv, Haifa and the Bank of Israel. In Jerusalem there are 10 standalone Windows 7 computers placed in the library that provide access to data for researchers. A researcher is assigned to one of the computers, and the data is copied to the computer and placed in a designated folder. The computers are backed up once a week. Researchers can receive output results by placing the files in a specified folder on the computer, and request ICBS to send the data. In both Tel Aviv and Haifa there are two computers in designated research rooms. The solution is much like Jerusalem, but the data is stored on removable discs encrypted with Microsoft bit locker. The removable discs are disconnected from the computer and stored in a safe place after work hours. Bank of Israel - for ‘research room’ files and currently also for ‘MUC’ files In the Bank of Israel there is a remote access research room with two computers. The room itself is protected by a smart card on the door and security cameras in the physical room. Researchers are identified by fingerprint, smartcards and a password before having access to servers and data located inside ICBS. The communication is protected by encryption in a site to site VPN connection on a leased line. Furthermore, firewalls, IDS/IPS and log monitoring systems are protecting the communication line.
IT SOLUTIONS 

Related to IT SOLUTIONS

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Verizon Operations Support Systems Verizon systems for pre- ordering, ordering, provisioning, maintenance and repair, and billing.

  • INFORMATION TECHNOLOGY The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Business Operations Company will provide all necessary equipment, personnel and other appurtenances necessary to conduct its operations. Company will conduct its business operations hereunder in a lawful, orderly and proper manner, considering the nature of such operations, so as not to unreasonably annoy, disturb, endanger or be offensive to others on the Airport. Company will provide all services under this Agreement on a fair and reasonable basis to all users of the Airport. Service will be prompt, courteous and efficient.

  • DISASTER RECOVERY AND BUSINESS CONTINUITY The Parties shall comply with the provisions of Schedule 5 (Disaster Recovery and Business Continuity).

  • Information and Services Required of the Owner § 3.1.1 The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.

  • ACCESS TO OPERATIONS SUPPORT SYSTEMS 2.1 BellSouth shall provide Max-Tel access to operations support systems (“OSS”) functions for pre-ordering, ordering and provisioning, maintenance and repair, and billing. BellSouth shall provide access to the OSS through manual and/or electronic interfaces as described in this Attachment. It is the sole responsibility of Max-Tel to obtain the technical capability to access and utilize BellSouth’s OSS interfaces. Specifications for Max-Tel ’s access and use of BellSouth’s electronic Version R4Q01: 12/01/01 interfaces are set forth at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx and are incorporated herein by reference.

  • Information Technologies Cooperation 1. The aims of cooperation in Information Technologies sectors, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to focus on cooperative activities towards information technology areas where mutual and complementary interests exists; and (b) to build on existing agreements and arrangements already in place between the Parties. 2. Information Technologies cooperation may include, but not be limited to: (a) scientific and technical cooperation for the Software Industry of the Parties and encouraging cooperation in software development for populations with specific needs; (b) facilitate the cooperation on academic, industrial and entrepreneurial networks in the area of Information Technology; (c) encouraging exchange of experience on management and research and development for Information Technology Parks; (d) research and development on Information Technology products and services, integrating television, multimedia, and cellular telephones; and (e) encouraging exchange of experience for research and development in networks and telecommunications.

  • Customer Ownership Customer owns and has sole responsibility for the accuracy, quality, integrity, and appropriateness of all original data, content and information provided to Xxxxxx Xxxxxxx in conjunction with the Services, and, when paid for, Customer will own all modified content and information as specified under the SOW (collectively the “Content,” which, together with the Customer’s trademarks or logos, are referred to as the “Customer Material).”

  • Business Continuity and Disaster Recovery Bank shall maintain and update from time to time business continuation and disaster recovery procedures with respect to its global custody business, which are designed, in the event of a significant business disruption affecting Bank, to be sufficient to enable Bank to resume and continue to perform its duties and obligations under this Agreement without undue delay or disruption. Bank shall test the operability of such procedures at least annually. Bank shall enter into and shall maintain in effect at all times during the term of this Agreement reasonable provision for (i) periodic back-up of the computer files and data with respect to Customer and (ii) use of alternative electronic data processing equipment to provide services under this Agreement. Upon reasonable request, Bank shall discuss with Customer any business continuation and disaster recovery procedures of Bank. Bank represents that its business continuation and disaster recovery procedures are appropriate for its business as a global custodian to investment companies registered under the 1940 Act.

Time is Money Join Law Insider Premium to draft better contracts faster.