Capacity. IET systems are monitored to optimize the use of resources and to control costs. Where services are hosted by external service providers (outsourced), agreements are in place to monitor capacity and performance. A loss of availability from causes which are beyond the control of IET is excluded from the availability warranty. This includes but is not limited to, acts from natural events such as earthquakes, storms, natural flooding, and wild fires. Also excluded are police actions, interruptions due to protest events, labor disputes, war, pandemic, terrorism, riots, and/or inability to obtain energy. Each party must provide prompt notice of service disruptions. Services will resume as soon as possible. Either party will take all reasonable steps to remove the causes of unavailability and resume services as soon as reasonably possible. IET will provide the availability status of major services on the IET status page. The status page is located at xxxx://xxxxxx.xxxxxxx.xxx/ Managed campus-wide systems, applications and services may be subject to the formal IET Change Management process. Changes to services may be required by system maintenance needs, corrective actions to resolve incidents, or service improvement projects. Changes may require adherence to change management policies including formal authorizations, approvals, peer reviews, risk assessments and lead times for notifying Customers and scheduling changes. IET notifies Customers about planned technology systems are changes that may have a risk of directly or indirectly impacting IET services. Information and Educational Technology shall be responsible for ensuring that reasonable skill, care and diligence are exercised in carrying out the services properly and efficiently in accordance with this service level agreement. Transnational data and information supplied by the Customer or its clients are owned by the Customer. IET serves as custodian of these data and will take measures to house, backup and protect the data for the Customer, consistent with the services, and as appropriate. Customer agrees to use and pay for the services in accordance with the terms of this agreement and in compliance with any overarching UC Xxxxx policies. Customer agrees to take appropriate steps to ensure compliance with The UC Xxxxx Cyber-safety Policy and UC Xxxxx Security Standards Policy (PPM Section 310-22). Customer agrees not to engage in actions or activities that circumvent, compromise, or introduce risks to the policy, standards or the controls established to ensure cyber security compliance. Customer is responsible for costs which result from improper use of the services and which cause damage or loss to IET or its Customers.
Appears in 156 contracts
Samples: Service Level Agreement, Service Level Agreement, Service Level Agreement
Capacity. IET systems are monitored to optimize the use of resources and to control costs. Where services are hosted by external service providers (outsourced), agreements are in place to monitor capacity and performance. A loss of availability from causes which are beyond the control of IET is excluded from the availability warranty. This includes but is not limited to, acts from natural events such as earthquakes, storms, natural flooding, and wild fires. Also excluded are police actions, interruptions due to protest eventsexplosions, labor disputes, war, pandemic, terrorism, riots, and/or and inability to obtain energy. Each party must provide prompt notice of service disruptions. Services will resume as soon as possible. Either party will take all reasonable steps to remove the causes of unavailability and resume services as soon as reasonably possible. IET will provide the The availability status of major services is maintained on the IET status page. The status page is located at xxxx://xxxxxx.xxxxxxx.xxx/ Managed campus-wide systems, applications and services may be subject to the formal IET Change Management process. Changes to services may be required by system maintenance needs, corrective actions to resolve incidents, or service improvement projects. Changes may require adherence to change management policies including formal authorizations, approvals, peer reviews, risk assessments and lead times for notifying Customers and scheduling changescustomers. IET notifies Customers about planned sends customer notifications when technology systems are changes changed. Notifications are sent at the start and at the conclusion of a change that may have a risk of directly or indirectly impacting IET services. Information and Educational Technology shall be responsible for ensuring that reasonable skill, care and diligence are exercised in carrying out the services properly and efficiently in accordance with this service level agreement. Transnational Transactional data and information supplied by the Customer customer or its clients are owned by the Customercustomer. IET serves as custodian of these data and will take measures to house, backup and protect the data for the Customercustomer, consistent with the services, and as appropriate. Customer agrees to use and pay for the services in accordance with the terms of this agreement and in compliance with any overarching UC Xxxxx policies. Customer agrees to take appropriate steps to ensure compliance with The UC Xxxxx Cyber-safety Policy and UC Xxxxx Security Standards Policy (PPM Section 310-22). Customer agrees not to engage in actions or activities that circumvent, compromise, or introduce risks to the policy, standards or the controls established to ensure cyber security compliance. Customer is responsible for costs which result from improper use of the services and which cause damage or loss to IET or its Customerscustomers.
Appears in 27 contracts
Samples: Service Level Agreement, Service Level Agreement, Service Level Agreement