SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.
Verizon OSS Services 8.2.1 Upon request by ECI, Verizon shall provide to ECI Verizon OSS Services. Such Verizon OSS Services will be provided in accordance with, but only to the extent required by, Applicable Law. 8.2.2 Subject to the requirements of Applicable Law, Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services that will be offered by Verizon, shall be as determined by Verizon. Subject to the requirements of Applicable Law, Verizon shall have the right to change Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services, from time-to-time, without the consent of ECI. 8.2.3 To the extent required by Applicable Law, in providing Verizon OSS Services to ECI, Verizon will comply with Verizon’s applicable OSS Change Management Guidelines, as such Guidelines are modified from time-to-time, including, but not limited to, the provisions of the Guidelines related to furnishing notice of changes in Verizon OSS Services. Verizon’s OSS Change Management Guidelines will be set out on a Verizon website.
Program Services a) Personalized Care Practice agrees to provide to Program Member certain enhancements and amenities to professional medical services to be rendered by Personalized Care Practice to Program Member, as further described in Schedule 1 to these Terms. Upon prior written notice to Program Member, Personalized Care Practice may add or modify the Program Services set forth in Schedule 1, as reasonably necessary, and subject to such additional fees and/or terms and conditions as may be reasonably necessary. b) Program Member acknowledges that the Program Services are services that are not covered services under any insurance contract to which Program Member may be a party, including, without limitation, Medicare, and are not reimbursable by Program Member’s insurer, health plan or any governmental entity, including Medicare. Program Member agrees to bear sole financial responsibility for the Member Amenities Fee and agrees not to submit to Program Member’s insurer, health plan or governmental entity any xxxx, invoice or claim for payment or reimbursement of such Member Amenities Fee. c) Personalized Care Practice or its designated affiliate will separately charge Program Member or Program Member’s insurer, health plan or governmental entity for medical, clinical, diagnostic or therapeutic services rendered by Personalized Care Practice or its designated affiliate to Program Member, and Program Member may seek payment or reimbursement from Program Member’s insurer or health plan for any such service to the extent covered by Program Member’s insurer, health plan or governmental entity. d) Program Member understands, agrees and covenants that this Agreement is a service contract, and not a contract for insurance.
Hosting Services 13.1 If Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract Hosts Customer Data in connection with an Acquisition, the provisions of Appendix 1, attached hereto and incorporated herein, apply to such Acquisition. 13.2 If the Hosting of Customer Data by Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract contributes to or directly causes a Data Breach, Supplier shall be responsible for the obligations set forth in Appendix 1 related to breach reporting requirements and associated costs. Likewise if such Hosting contributes to or directly causes a Security Incident, Supplier shall be responsible for the obligations set forth in Appendix 1, as applicable. 14 Change Management
Support Services Rehabilitation, counselling and EAP’s. Support is strictly non- punitive, and can be accessed at anytime (self-identification of the need for help is strongly encouraged).
TAX SUPPORT SERVICES BNY Mellon shall provide the following tax support services for each Fund: Provide various data and reports as agreed upon in the SLDs to support TRP’s tax reporting and tax filing obligations, including: · Wash sales reporting; · QDI reporting; · DRD reporting; · PFIC analysis; · Straddle analysis; · Paydown adjustments; · Equalization debit adjustments · Tax compliance under §851, §817(h); · Foreign bond sale analysis (§988); · Troubled debt analysis; · Estimation of income for excise tax purposes; · Swap analysis; · Inflation adjustments; · §1256 adjustments; · Market discount analysis; OID adjustments; · CPDI analysis; · Shareholder tax reporting information (e.g. FTC, UGG income, foreign source income by country, exempt income by state); Provide data, and reports based on such data, maintained by BNY Mellon on its fund accounting platform as reasonably requested by TRP to support TRP’s obligations to comply with requests from tax authorities and TRP’s tax reporting and tax filing obligations. Assist with other tax-related data needs as mutually agreed upon in writing from time-to-time.
EFT SERVICES If approved, you may conduct any one (1) or more of the EFT services offered by the Credit Union.
Reporting of Total Compensation of Subrecipient Executives 1. Applicability and what to report. Unless you are exempt as provided in paragraph d. of this award term, for each first-tier subrecipient under this award, you shall report the names and total compensation of each of the subrecipient's five most highly compensated executives for the subrecipient's preceding completed fiscal year, if-- i. in the subrecipient's preceding fiscal year, the subrecipient received-- (A) 80 percent or more of its annual gross revenues from Federal procurement contracts (and subcontracts) and Federal financial assistance subject to the Transparency Act, as defined at 2 CFR 170.320 (and subawards); and (B) $25,000,000 or more in annual gross revenues from Federal procurement contracts (and subcontracts), and Federal financial assistance subject to the Transparency Act (and subawards); and ii. The public does not have access to information about the compensation of the executives through periodic reports filed under section 13(a) or 15(d) of the Securities Exchange Act of 1934 (15 U.S.C. 78m(a), 78o(d)) or section 6104 of the Internal Revenue Code of 1986. (To determine if the public has access to the compensation information, see the U.S. Security and Exchange Commission total compensation filings at xxxx://xxx.xxx.xxx/answers/execomp.htm.) 2. Where and when to report. You must report subrecipient executive total compensation described in paragraph c.1. of this award term: i. To the recipient. ii. By the end of the month following the month during which you make the subaward. For example, if a subaward is obligated on any date during the month of October of a given year (i.e., between October 1 and 31), you must report any required compensation information of the subrecipient by November 30 of that year.
PERFORMANCE MANAGEMENT SYSTEM 6.1 The Performance Plan (Annexure A) to this Agreement sets out – 6.1.1 The standards and procedures for evaluating the Employee’s performance; and 6.1.2 The intervals for the evaluation of the Employee’s performance. 6.2 Despite the establishment of agreed intervals for evaluation, the Employer may in addition review the Employee’s performance at any stage while the contract of employment remains in force; 6.3 Personal growth and development needs identified during any performance review discussion must be documented in a Personal Development Plan as well as the actions agreed to and implementation must take place within set time frames; 6.4 The Employee’s performance will be measured in terms of contributions to the goals and strategies set out in the Employer’s Integrated Development Plan (IDP) as described in 6.6 – 6.12 below; 6.5 The Employee will submit quarterly performance reports (SDBIP) and a comprehensive annual performance report at least one week prior to the performance assessment meetings to the Evaluation Panel Chairperson for distribution to the panel members for preparation purposes; 6.6 Assessment of the achievement of results as outlined in the performance plan: 6.6.1 Each KPI or group of KPIs shall be assessed according to the extent to which the specified standards or performance targets have been met and with due regard to ad-hoc tasks that had to be performed under the KPI, and the score of the employer will be given to and explained to the Employee during the assessment interview. 6.6.2 A rating on the five-point scale shall be provided for each KPI or group of KPIs which will then be multiplied by the weighting to calculate the final score; 6.6.3 The Employee will submit his self-evaluation to the Employer prior to the formal assessment; 6.6.4 In the instance where the employee could not perform due to reasons outside the control of the employer and employee, the KPI will not be considered during the evaluation. The employee should provide sufficient evidence in such instances; and 6.6.5 An overall score will be calculated based on the total of the individual scores calculated above.
Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.