BACKUP DATA Sample Clauses

BACKUP DATA a. The content of any Backup Data in any form provided to Arcserve for use with the Services is your responsibility and Arcserve does not control, verify, or endorse the content of such Backup Data.
AutoNDA by SimpleDocs
BACKUP DATA. Back up data (including but not limited to copies of timesheets, invoices, receipts and expense report for materials and supplies) shall be available for review by the City in support of each invoice issued in accordance with section 3.2.2. To review backup data for an invoice, the Authorized Representative of the City must request such review within ninety (90) days following receipt of an invoice. Backup data will be available for review by the Authorized Representative of the City at the LCPD office during normal working hours.
BACKUP DATA. This use case would occur when the user needs to make a backup of all data to local or removable media. This function might only be enabled for supervisors if that is the intent of the study designer. This function might also allow the user to designate the destination of the backup or allowing naming of backup files according to the configuration of the study design.
BACKUP DATA. Customer has responsibility for performing data backups and verifying the integrity of the backup on any and all devices which could be affected during installation, maintenance or upgrade. Transcendent will confirm that a full data backup was performed prior to implementation. In the event Customer’s system should lose Customer and site-specific data due to natural or unnatural acts during implementation, stored data will be used to restore Customer system. Transcendent will assist the Customer to restore data in the event Customer’s data becomes corrupted during implementation. Transcendent is not responsible for corrupt, inaccurate configuration, lost, damaged or unrecoverable media errors unless negligence on the part of Transcendent contributes to such corruption, inaccurate configuration, loss or damage. Additional billable time will be assessed if it is necessary to perform data backup or restoration resulting from errors not caused by or contributed to by Transcendent.
BACKUP DATA. This is to backup your Software Data to the selected folder. There will be a com- plete backup for every day and the last backup file will include the entire data until the backup time. You can remove the old backup files manually if there is no space in the Hard Disk or USB Stick. The Backup will Run automatically while the Software is Closing.

Related to BACKUP DATA

  • Backups Provider agrees to maintain backup copies, backed up at least daily, of Student Data in case of Provider’s system failure or any other unforeseen event resulting in loss of Student Data or any portion thereof.

  • Backup Copies You may also make copies of the SOFTWARE PRODUCT as may be necessary for backup and archival purposes.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Line Information Database 9.1 LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, e-Tel must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • Backup Authorized Devices that are not shared devices will periodically create automatic backups that are transmitted to the Service when the user is logged in with their Managed Apple ID and the device is screen-locked, connected to a power source, and connected to the Internet via a Wi-Fi network. You may disable backup in the MDM Enrollment Settings. Backup is limited to device settings, device characteristics, photos, videos, documents, messages (iMessage, SMS and MMS, if enabled), ringtones, app data (including Health app data), location settings (such as location-based reminders that You have set up), and Home screen and app organization. Content that You purchase, download or provide access to Your End Users from the iTunes Store, App Store or iBooks Store, and Content purchased from or provided by any third parties, will not be backed up. Such Content may be eligible for re- download from those services, subject to account requirements, availability, and any applicable terms and conditions. Content synced from Your End Users’ computers will not be backed up. If You enable iCloud Photo Library, the photo libraries of Your End Users will be backed up separately from their automatic iCloud backup. The Content stored in an End User’s contacts, calendars, bookmarks, and documents is accessible via iCloud on the web or on any of the End User’s Authorized Devices. When iCloud Backup is enabled, devices managed or controlled by Your Institution will not back up to iTunes automatically during a sync, but You may enable End Users to manually initiate a backup to iTunes. It is solely Your responsibility to maintain appropriate alternative backup of Your and Your End Users’ information and data.

  • Location Data Apple and its partners, licensees and third party developers may provide certain services through the Apple Software that rely upon location information. To provide and improve these services, where available, Apple and its partners, licensees and third party developers may transmit, collect, maintain, process and use your location data, including the real-time geographic location of your computer, and location search queries. The location data and queries collected by Apple are collected in a form that does not personally identify you and may be used by Apple and its partners, licensees and third party developers to provide and improve location-based products and services. By using any location-based services provided by or through the Apple Software, you agree and consent to Apple's and its partners', licensees' and third party developers’ transmission, collection, maintenance, processing and use of your location data and queries to provide and improve such products and services. You may withdraw this consent at any time by going to the Location Services setting in the Apple Software and either turning off the global Location Services setting or turning off the individual location setting of each location-aware application on your computer. The Location Services setting is found in the Security & Privacy pane within System Preferences. When using third party applications or services on your computer that use or provide location data, you are subject to and should review such third party's terms and privacy policy on use of location data by such third party applications or services.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • BACKUP COPY You may make one backup copy of the software. You may use it only to reinstall the software.

  • Authoritative Root Database To the extent that ICANN is authorized to set policy with regard to an authoritative root server system (the “Authoritative Root Server System”), ICANN shall use commercially reasonable efforts to (a) ensure that the authoritative root will point to the top-­‐level domain nameservers designated by Registry Operator for the TLD, (b) maintain a stable, secure, and authoritative publicly available database of relevant information about the TLD, in accordance with ICANN publicly available policies and procedures, and (c) coordinate the Authoritative Root Server System so that it is operated and maintained in a stable and secure manner; provided, that ICANN shall not be in breach of this Agreement and ICANN shall have no liability in the event that any third party (including any governmental entity or internet service provider) blocks or restricts access to the TLD in any jurisdiction.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

Time is Money Join Law Insider Premium to draft better contracts faster.