Computer output evidence Sample Clauses

Computer output evidence. 25.1 Where in any action, suit or proceeding between the Service Provider and a participant, computer output is tendered by the Service Provider as to any message or instruction transmitted or any Transaction executed or settled under MEPS+, or as to any computer software used in the host or SWIFT CBT, including the Relationship Management Application, SWIFT certificates, digital signatures and security software, or as to the operation of any such computer software in MEPS+, the participant and the Service Provider hereby expressly agree by this Rule that neither the authenticity nor the accuracy of the contents of the computer output shall be disputed for the purposes of the Evidence Act (Cap. 97).
AutoNDA by SimpleDocs

Related to Computer output evidence

  • Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Earned Value Management System ‌ An earned value management system (EVMS) means a project management tool that effectively integrates the project scope of work with cost, schedule and performance elements for optimum project planning and control. The qualities and operating characteristics of EVMS are described in American National Standards Institute /Electronics Industries Alliance (ANSI/EIA) Standard-748. An EVMS is not mandatory; however, Contractors are encouraged to have an EVMS ANSI/EIA Standard-748 during the entire term of OASIS. The Contractor shall notify the OASIS CO, in writing, if there are any changes in the status of their EVMS and provide the reasons for the change and copies of audits by the Defense Contract Management Agency (DCMA) or other cognizant Government administration office, as applicable. If only part of a Contractor’s organization is EVMS ANSI/EIA Standard-748 certified, the Contractor shall make the distinction between which business units or sites and geographic locations have been certified.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Certified and Minority Business Enterprises Reports Upon Customer request, the Contractor shall report to the requesting Customer the Contractor’s spend with certified and other minority business enterprises in the provision of commodities or services related to the Customer’s orders. These reports shall include the period covered, the name, minority code, and Federal Employer Identification Number of each minority business utilized during the period; commodities and services provided by the minority business enterprise, and the amount paid to each minority business enterprise on behalf of the Customer.

  • Computer Requirements You are responsible for obtaining, installing, maintaining and operating all software, hardware, or other equipment necessary (collectively, “Access Device Systems”) necessary for you to access and use the Service. This responsibility includes, without limitation, your utilizing up to date web-browsers and Access Devices and the best commercially available encryption, antivirus, anti-spyware, and Internet security software. You are additionally responsible for obtaining Internet service via an Internet service provider of your choice, for any and all fees imposed by such Internet service provider, and any associated communications service provider charges. You acknowledge that there are certain security, corruption, transmission error and access availability risks associated with using open networks such as the Internet and you hereby expressly assume such risk, including, but not limited to those we may disclose in our educational materials. You acknowledge that you are responsible for data security of the Systems used to access the Service, and for the transmission and receipt of information using such System. You acknowledge that you have requested the Service for your convenience, have made your own independent assessment of the adequacy of the Internet and Systems and that you are satisfied with that assessment. The Bank shall have no responsibility for failures, interruption or other defects in the Services, which arise from the malfunction or failure of the Internet or your Systems nor are we responsible for notifying you of any upgrades, fixes, or enhancements to, or for providing technical or other support for your Systems. The Bank may add to, modify, or replace software programs used in conjunction with providing the Services under this Agreement at its sole discretion and without notice, provided Services rendered to you are not substantially negatively affected or obligations altered.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.