ACCESSIBILITY AND ARCHIVING OF DATA Sample Clauses

ACCESSIBILITY AND ARCHIVING OF DATA. 8.1 All information and/or data on the Access EDD Website and/or the Access EDD Database is provided on an “as is” basis. Except to the extent required by law, no representations, warranties or terms of any kind are made (or shall be implied by statute or otherwise) in respect of the Access EDD Website, the Access EDD Database or the content, including warranties of satisfactory quality, conformity to contract, accuracy, adequacy, conformity to description or fitness for any particular purpose. 8.2 Subject to clause 8.1.2, neither We nor any of Our Sub-contractors or affiliates gives any warranty or guarantee: 8.2.1 relating to the availability of the Access EDD Website or the Access EDD Database; 8.2.2 that the Access EDD Website or the Access EDD Database and/or operation of them, the content or the server on which the Access EDD Website and/or the Access EDD Database are available, are error or virus free or free of other harmful components; or 8.2.3 that Your use of the Access EDD Website or the Access EDD Database will be uninterrupted.
AutoNDA by SimpleDocs
ACCESSIBILITY AND ARCHIVING OF DATA. ‌ 8 .1 All information and/or data on the Access EDD Website an d/or the Access EDD Database is provided on an “as is” basis. Except to the extent req uired by law, no representations, warranties or terms of any kind are made (or shall be implied by statute or otherwise) in respect of the Access EDD Website, the Access EDD Database or the content, including warranties of satisfactory quality, conformity to contract, accuracy, ad eq uacy, conformity to description or fitness for any particular purpose. 8 .2 Subject to clause 8.1.2, neither We nor any of Our Sub-contractors or affiliates gives any warranty or guarantee: 8 .2.1 relating to the availability of the Access EDD Website or the Access EDD Database; 8 .2.2 that the Access EDD Website or the Access EDD Database and/or operation of them, the content or the server on which the Access EDD Website an d/or the Access EDD Database are available, are error or virus free or free of other harmful components; or 8 .2.3 that Your use of the Access EDD Website or the Access EDD Database will be uninterrupted.

Related to ACCESSIBILITY AND ARCHIVING OF DATA

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Marking of Data Pursuant to Paragraph A above, any Data delivered under this Agreement shall be marked with the following legend: Use, duplication, or disclosure is subject to the restrictions as stated in Agreement HR0011-XX-9-XXXX between the Government and the Performer.

  • Line Information Database LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, ONS must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Transparency and Freedom of Information 15.1 The Contractor acknowledges that the Authority is subject to the requirements of FOISA and the Environmental Information Regulations. The Contractor shall: (a) provide all necessary assistance and cooperation as the Authority may reasonably request to enable the Authority to comply with its obligations under FOISA and Environmental Information Regulations; (b) transfer to the Authority all Requests for Information relating to this Agreement that the Contractor receives as soon as practicable and in any event within 2 Working Days of receipt; (c) provide the Authority with a copy of all information held on behalf of the Authority which is requested in a Request For Information and which is in the Contractor’s possession or control. The information must be provided within 5 Working Days (or such other period as the Authority may reasonably specify) in the form that the Authority requires. (d) not respond directly to a Request For Information addressed to the Authority unless authorised in writing to do so by the Authority. 15.2 If the Request for Information appears to be directed to information held by the Authority, the Contractor must promptly inform the applicant in writing that the Request for Information can be directed to the Authority. 15.3 If the Authority receives a Request for Information concerning the Framework Agreement, the Authority is responsible for determining at its absolute discretion whether the information requested is to be disclosed to the applicant or whether the information requested is exempt from disclosure in accordance with FOISA or the Environmental Information Regulations. 15.4 The Contractor acknowledges that the Authority may, acting in accordance with the Authority’s Code of Practice on the Discharge of Functions of Public Authorities issued under section 60(5) of FOISA (as may be issued and revised from time to time), be obliged under FOISA or the Environmental Information Regulations to disclose information requested concerning the Contractor or the Framework Agreement: 15.4.1 in certain circumstances without consulting the Contractor, or 15.4.2 following consultation with the Contractor and having taken its views into account.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Customer Materials Subject to Section 4(a), all right, title and interest (including all Intellectual Property Rights) in and to the Customer Materials are owned by Customer or Customer’s suppliers.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!