Conversion of data Sample Clauses

Conversion of data. The Contractor will work jointly with King County staff to convert existing data into the Oracle database format. Specifications for detailed translations of the data and other required data will be provided by the Contractor. King County will extract data from existing database and the Contractor will provide conversion programs and load data into the Oracle database. King County will enter any additional data into the newly created database. King County will verify and validate conversion data. It is anticipated that only Capacity Charge A/R will convert data.
AutoNDA by SimpleDocs
Conversion of data. System Warranty Year 1 Post Warranty Maintenance & Support year 2.......

Related to Conversion of data

  • Provision of Data 26.1 The Supplier shall submit all information required under applicable law and regulations, such as but not limited to information required to meet financial and administrative obligations. If Wavin has not received one or more of the requested documents within ten (10) days of making the request, Wavin shall be entitled to suspend payment until the moment of receipt, or to terminate the Agreement without any liability. 26.2 Every change in the data submitted under clause 26.1 must be immediately reported to Wavin in writing.

  • Transmission of Data Customer understands that the technical processing and transmission of Customer’s Electronic Communications is fundamentally necessary to use of the Cloud Service. Customer is responsible for securing DSL, cable or another high speed Internet connection and up-to-date “browser” software in order to utilize the Cloud Service. Customer expressly consents to Oracle’s interception and storage of Electronic Communications and/or Customer Data as needed to provide the Services hereunder, and Customer acknowledges and understands that Customer’s Electronic Communications will involve transmission over the Internet, and over various networks, only part of which may be owned and/or operated by Oracle. Customer further acknowledges and understands that Electronic Communications may be accessed by unauthorized parties when communicated across the Internet, network communications facilities, telephone or other electronic means. Without limiting Oracle’s applicable obligations under the Security or Confidentiality Sections of this Agreement, Oracle is not responsible for any Electronic Communications and/or Customer Data which are delayed, lost, altered, intercepted or stored during the transmission of any data whatsoever across networks not owned and/or operated by Oracle, including, but not limited to, the Internet and Customer’s local network.

  • Disposition of Data Upon written request from the LEA, Provider shall dispose of or provide a mechanism for the LEA to transfer Student Data obtained under the Service Agreement, within sixty (60) days of the date of said request and according to a schedule and procedure as the Parties may reasonably agree. Upon termination of this DPA, if no written request from the LEA is received, Provider shall dispose of all Student Data after providing the LEA with reasonable prior notice. The duty to dispose of Student Data shall not extend to Student Data that had been De-Identified or placed in a separate student account pursuant to section II 3. The LEA may employ a “Directive for Disposition of Data” form, a copy of which is attached hereto as Exhibit “D”. If the LEA and Provider employ Exhibit “D,” no further written request or notice is required on the part of either party prior to the disposition of Student Data described in Exhibit “D.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Retention of Data With regard to business transactions covered by this Agreement, Licensee must retain any records for a period of ten years starting on 1th of January of the year following the year during which the data were transmitted or otherwise transferred, or for the minimum period prescribed by applicable law, whichever is longer. In addition, Licensee must maintain current, complete and accurate reports on all of SAP’s Confidential Information in its possession or in the possession of its representatives.

  • Calculation of Damages (a) The amount of any Damages payable under Section 9.02 by the Indemnifying Party shall be net of any amounts recovered or recoverable by the Indemnified Party under applicable insurance policies from any other third party with indemnification obligations or from any other Person alleged to be responsible therefor. If the Indemnified Party receives any amounts under applicable insurance policies, from any other third party with indemnification obligations or from any other Person alleged to be responsible for any Damages, subsequent to an indemnification payment by the Indemnifying Party, then such Indemnified Party shall promptly reimburse the Indemnifying Party for any payment made or expense incurred by such Indemnifying Party in connection with providing such indemnification payment up to the amount received by the Indemnified Party, net of any expenses incurred by such Indemnified Party in collecting such amount. (b) The Indemnifying Party shall not be liable under Section 9.02 for any (i) Damages relating to any matter to the extent that there is included in the Preliminary Balance Sheet a specific liability or reserve relating to such matter, (ii) consequential or punitive Damages or (iii) Damages for lost profits. (c) Notwithstanding any other provision of this Agreement to the contrary, if on the Closing Date the Indemnified Party has actual knowledge of any information that would cause one or more of the representations and warranties made by the Indemnifying Party to be inaccurate as of the date made, the Indemnified Party shall have no right or remedy after the Closing with respect to such inaccuracy and shall be deemed to have waived its rights to indemnification in respect thereof.

  • Destruction of Data Provider shall destroy or delete all Personally Identifiable Data contained in Student Data and obtained under the DPA when it is no longer needed for the purpose for which it was obtained or transfer said data to LEA or LEA’s designee, according to a schedule and procedure as the parties may reasonable agree. Nothing in the DPA authorizes Provider to maintain personally identifiable data beyond the time period reasonably needed to complete the disposition.

  • Return of Data In the event of the termination of Executive’s employment with Company for any reason whatsoever, Executive agrees to deliver promptly to Company all formulas, correspondence, reports, computer programs and similar items, customer lists, marketing and sales data and all other materials pertaining to Confidential Information, and all copies thereof, obtained by Executive during the period of Executive’s employment with Company which are in Executive’s possession or under his control. Executive further agrees that Executive will not make or retain any copies of any of the foregoing and will so represent to Company upon termination of his employment.

  • Identification of Data a. All Background, Third Party Proprietary and Controlled Government Data provided by Disclosing Party shall be identified in the Annex under which it will be provided. b. NASA software and related Data provided to Partner shall be identified in the Annex under which it will be used. Notwithstanding H.4., Software and related Data will be provided to Partner under a separate Software Usage Agreement (SUA). Partner shall use and protect the related Data in accordance with this Article. Unless the SUA authorizes retention, or Partner enters into a license under 37 C.F.R. Part 404, the related Data shall be disposed of as instructed by NASA.

  • Exclusion of Damages TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT WILL EITHER PARTY BE LIABLE UNDER OR IN CONNECTION WITH THIS AGREEMENT OR ITS SUBJECT MATTER UNDER ANY LEGAL OR EQUITABLE THEORY, INCLUDING BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY, AND OTHERWISE, INCLUDING FOR ANY: (a) LOSS OF PRODUCTION, USE, BUSINESS, REVENUE, OR PROFIT OR DIMINUTION IN VALUE; (b) IMPAIRMENT, INABILITY TO USE OR LOSS, INTERRUPTION OR DELAY OF THE SERVICES; (c) LOSS, DAMAGE, CORRUPTION OR RECOVERY OF DATA, OR BREACH OF DATA OR SYSTEM SECURITY; (d) COST OF REPLACEMENT GOODS OR SERVICES; (e) LOSS OF GOODWILL, LOSS OF BUSINESS OPPORTUNITY OR PROFIT, OR LOSS OF REPUTATION; OR (f) CONSEQUENTIAL, INCIDENTAL, INDIRECT, EXEMPLARY, SPECIAL, ENHANCED, OR PUNITIVE DAMAGES, REGARDLESS OF WHETHER SUCH PERSONS WERE ADVISED OF THE POSSIBILITY OF SUCH LOSSES OR DAMAGES OR SUCH LOSSES OR DAMAGES WERE OTHERWISE FORESEEABLE, AND NOTWITHSTANDING THE FAILURE OF ANY AGREED OR OTHER REMEDY OF ITS ESSENTIAL PURPOSE.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!