AIG GISC   ALICO - Japan       Mainframe ID Sample Clauses

AIG GISC   ALICO - Japan       Mainframe ID. Provide mainframe account management Users - 5,219 LPAR - 1 US$3 per user ID per month US$1,500 per LPAR per month TBD US$ (Unit of Charge/Quantity)*(Monthly Unit Charge) per month GISC manages the Top Secret Service for the Japan mainframe, but does not perform ID provisioning. The management of the Top Secret Service includes • ID administration and maintenance for System Started Tasks, • resource administration for System resources and privileges, • software maintenance, upgrades, and IVPs, • monitoring for adherence to security standards and policies, • creation, implementation, maintenance, monitoring, and distribution of violation reports, • support and troubleshoot mainframe security access issues All Service Charges shall not be subject to any additional charges whatsoever for Provider Costs, Overhead Costs or any other costs (other than permitted Pass-Through Charges, if applicable). There are no Set-Up Costs for these Services.
AutoNDA by SimpleDocs

Related to AIG GISC   ALICO - Japan       Mainframe ID

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

  • Conhecimento da Lingua O Contratado, pelo presente instrumento, declara expressamente que tem pleno conhecimento da língua inglesa e que leu, compreendeu e livremente aceitou e concordou com os termos e condições estabelecidas no Plano e no Acordo de Atribuição (“Agreement” xx xxxxxx).

  • Xxxxxxxx Tobacco Co the jury returned a verdict in favor of the plaintiff, found the plaintiff to be 30% at fault and RJR Tobacco to be 70% at fault, and awarded $9 million in compensatory damages and $1 million in punitive damages. For a detailed description of the above-described cases, see “— Xxxxx and Xxxxx Progeny Cases” below. In addition, since the end of the third quarter of 2013, jurors returned a verdict in the following Xxxxx Progeny case:

  • Anti-Layering The Company shall not incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is subordinate or junior in right of payment to any Senior Debt of the Company and senior in any respect in right of payment to the Notes. No Guarantor shall incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is subordinate or junior in right of payment to the Senior Debt of such Guarantor and senior in any respect in right of payment to such Guarantor's Subsidiary Guarantee.

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • WHEXXXX xs xxxx of a plan of reorganization, RESTART PARTNERS, L.P., a Delaware Limited Partnership ("Restart"), may acquire an ownership interest in Elsinore Corporation ("Elsinore") or the Four Queens, Inc. ("FQI");

  • Measurement and Monitoring Tools As of the Effective date, Vendor and Prudential will mutually agree on the measurements and service level management procedures, pursuant to the governance procedures set forth in Attachment G and performance standards set forth in Attachment E-1 and E-2, to measure Vendor's performance of the Services against the applicable Service Levels. Such measurement and monitoring tools and procedures will (a) for Attachment E-1, be implemented upon the Effective Date; (b) for Attachment E-2, be implemented after successful completion of all testing and written acceptance by Prudential of the Transition Services set forth in Attachment B-1; (c) permit reporting at a level of detail sufficient to verify compliance with the Service Levels; and (d) be subject to audit by Prudential or its designee in accordance with the Agreement, except such audit will not include the installation of any audit software on Vendor's network.

  • Technology For purposes of this Agreement, “Technology” means all Software, information, designs, formulae, algorithms, procedures, methods, techniques, ideas, know-how, research and development, technical data, programs, subroutines, tools, materials, specifications, processes, inventions (whether or not patentable and whether or not reduced to practice), apparatus, creations, improvements and other similar materials, and all recordings, graphs, drawings, reports, analyses, and other writings, and other embodiments of any of the foregoing, in any form or media whether or not specifically listed herein. Further, for purposes of this Agreement, “Software” means any and all computer programs, whether in source code or object code; databases and compilations, whether machine readable or otherwise; descriptions, flow-charts and other work product used to design, plan, organize and develop any of the foregoing; and all documentation, including user manuals and other training documentation, related to any of the foregoing.

  • No Reliance on Administrative Agent’s Customer Identification Program Each Lender acknowledges and agrees that neither such Lender, nor any of its Affiliates, participants or assignees, may rely on the Administrative Agent to carry out such Lender’s, Affiliate’s, participant’s or assignee’s customer identification program, or other obligations required or imposed under or pursuant to the USA Patriot Act or the regulations thereunder, including the regulations contained in 31 CFR 103.121 (as hereafter amended or replaced, the “CIP Regulations”), or any other Anti-Terrorism Law, including any programs involving any of the following items relating to or in connection with any of the Loan Parties, their Affiliates or their agents, the Loan Documents or the transactions hereunder or contemplated hereby: (i) any identity verification procedures, (ii) any recordkeeping, (iii) comparisons with government lists, (iv) customer notices or (v) other procedures required under the CIP Regulations or such other Laws.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!