Business Processing Playbook Sample Clauses

Business Processing Playbook. The parties will jointly develop a "playbook" for the Licensee containing the processes to meet Licensee's reasonable business requirements with respect to the Hosted Software. The initial playbook must be created prior to running live in production on the Host Equipment and then updated on a periodic basis as necessary. The playbook shall supplement and be incorporated into this Exhibit C; Licensee recognizes, however, that compliance with the playbook involves interdependencies and joint responsibilities. At a minimum, the playbook shall include a detailed description of: (a) Movements of all inbound and outbound data streams, associated application interfaces, and job processes with interdependencies. (b) All forms of communication information for the relevant parties (emails, telephone, etc.) connected with exception reporting for disruptions in the business processes as detailed in the playbook. (c) Responsible party for correcting the disruption ofthe business process. (d) Regularly scheduled maintenance windows and database backups. As part ofthe activities to be performed pursuant to the playbook, Licensee will be entitled to have Eagle conduct five (5) in-cycle time-based job monitors (files and/or scheduled events) within Licensee's daily workflow. Upon receipt ofan alert from a monitor, an Eagle technical resource will work to remediate the workflow disruption and promote successful job execution as described in Licensee's playbook. Eagle technical resources will notify Licensee as necessary in cases where a business decision is needed from Licensee to complete the job cycle. Supplementary in-cycle job monitors may be included for an additional fee (see Premium Services Addendum Exhibit E).
AutoNDA by SimpleDocs

Related to Business Processing Playbook

  • Customer Services Customer Relationship Management (CRM): All aspects of the CRM process, including planning, scheduling, and control activities involved with service delivery. The service components facilitate agencies’ requirements for managing and coordinating customer interactions across multiple communication channels and business lines. Customer Preferences: Customizing customer preferences relative to interface requirements and information delivery mechanisms (e.g., personalization, subscriptions, alerts and notifications).

  • Online Services Microsoft warrants that each Online Service will perform in accordance with the applicable SLA during Customer’s use. Customer’s remedies for breach of this warranty are described in the SLA.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Sub-processing 11.1 The data importer shall not subcontract any of its processing operations performed on behalf of the data exporter under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it shall do so only by way of a written agreement with the sub-processor which imposes the same obligations on the sub- processor as are imposed on the data importer under the Clauses. Where the sub-processor fails to fulfil its data protection obligations under such written agreement the data importer shall remain fully liable to the data exporter for the performance of the sub-processor’s obligations under such agreement. 11.2 The prior written contract between the data importer and the sub-processor shall also provide for a third-party beneficiary clause as laid down in Clause 3 for cases where the data subject is not able to bring the claim for compensation referred to in paragraph 1 of Clause 6 against the data exporter or the data importer because they have factually disappeared or have ceased to exist in law or have become insolvent and no successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law. Such third-party liability of the sub-processor shall be limited to its own processing operations under the Clauses. 11.3 The provisions relating to data protection aspects for sub-processing of the contract referred to in paragraph 1 shall be governed by the law of the Member State in which the data exporter is established, namely ........................................ 11.4 The data exporter shall keep a list of sub-processing agreements concluded under the Clauses and notified by the data importer pursuant to Clause 5(j), which shall be updated at least once a year. The list shall be available to the data exporter’s data protection supervisory authority.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Customer Care a) Contractor shall comply with the applicable requirements of the Americans with Disabilities Act and provide culturally competent customer service to all Covered California Enrollees in accordance with the applicable provisions of 45 C.F.R. § 155.205 and § 155.210, which refer to consumer assistance tools and the provision of culturally and linguistically appropriate information and related products. b) Contractor shall comply with HIPAA rules and other laws, rules and regulations respecting privacy and security.

  • Catalog Information about Hawthorn University is published in a school catalog that contains a description of certain policies, procedures, and other information about the school. Hawthorn University reserves the right to change any provision of the catalog at any time. Notice of changes will be communicated in a revised catalog, an addendum or supplement to the catalog, or other written format. Students are expected to read and be familiar with the information contained in the school catalog, in any revisions, supplements and addenda to the catalog, and with all school policies. By enrolling in Hawthorn University, the student agrees to abide by the terms stated in the catalog and all school policies.

  • Processing operations The personal data transferred will be subject to the following basic processing activities (please specify):

  • COVID-19 Vaccine Passports Pursuant to Texas Health and Safety Code, Section 161.0085(c), Contractor certifies that it does not require its customers to provide any documentation certifying the customer’s COVID-19 vaccination or post-transmission recovery on entry to, to gain access to, or to receive service from the Contractor’s business. Contractor acknowledges that such a vaccine or recovery requirement would make Contractor ineligible for a state-funded contract.

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network or non- network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network or non-network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!