The Advisers Services (a) DISCRETIONARY INVESTMENT MANAGEMENT SERVICES. The Adviser shall act as investment adviser with respect to the Funds. In such capacity, the Adviser shall, subject to the supervision of the Board, regularly provide the Funds with investment research, advice and supervision and shall furnish continuously an investment program for the Funds, consistent with the respective investment objectives and policies of each Fund. The Adviser shall determine, from time to time, what securities shall be purchased for the Funds, what securities shall be held or sold by the Funds and what portion of the Funds' assets shall be held uninvested in cash, subject always to the provisions of the Trust's Agreement and Declaration of Trust, By-Laws and its registration statement on Form N-1A (the "Registration Statement") under the 1940 Act, and under the Securities Act of 1933, as amended (the "1933 Act"), covering Fund shares, as filed with the Securities and Exchange Commission (the "Commission"), and to the investment objectives, policies and restrictions of the Funds, as each of the same shall be from time to time in effect. To carry out such obligations, the Adviser shall exercise full discretion and act for the Funds in the same manner and with the same force and effect as the Funds themselves might or could do with respect to purchases, sales or other transactions, as well as with respect to all other such things necessary or incidental to the furtherance or conduct of such purchases, sales or other transactions. No reference in this Agreement to the Adviser having full discretionary authority over each Fund's investments shall in any way limit the right of the Board, in its sole discretion, to establish or revise policies in connection with the management of a Fund's assets or to otherwise exercise its right to control the overall management of a Fund.
DNS Service TLD Zone Contents 1.1. Apex SOA record 1.2. Apex NS records and in-‐bailiwick glue for the TLD’s DNS servers 1.3. NS records and in-‐bailiwick glue for DNS servers of registered names in the TLD
CLOUD SERVICE The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The Order Document will consist of the Quotation that is provided and the Proof of Entitlement (XxX) you will receive confirming the start date and term of the Cloud Services and when invoicing will commence.
ADS Services Up to U.S. $5.00 per 100 ADSs (or fraction thereof) held on the applicable record date(s) established by the Depositary. Person holding ADSs on the applicable record date(s) established by the Depositary.
Verizon OSS Services 8.2.1 Upon request by ECI, Verizon shall provide to ECI Verizon OSS Services. Such Verizon OSS Services will be provided in accordance with, but only to the extent required by, Applicable Law. 8.2.2 Subject to the requirements of Applicable Law, Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services that will be offered by Verizon, shall be as determined by Verizon. Subject to the requirements of Applicable Law, Verizon shall have the right to change Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services, from time-to-time, without the consent of ECI. 8.2.3 To the extent required by Applicable Law, in providing Verizon OSS Services to ECI, Verizon will comply with Verizon’s applicable OSS Change Management Guidelines, as such Guidelines are modified from time-to-time, including, but not limited to, the provisions of the Guidelines related to furnishing notice of changes in Verizon OSS Services. Verizon’s OSS Change Management Guidelines will be set out on a Verizon website.
SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.
Consultants’ Services All consultants’ services required for the Project and to be financed out of the proceeds of the Financing shall be procured in accordance with the requirements set forth or referred to in Sections I and IV of the Consultant Guidelines, and with the provisions of this Section.
Consultancy 2.1 The Consultancy's obligation to provide the Consultancy Services shall be performed by one or more employees of the Consultancy as the Consultancy may consider appropriate (“the Staff”), subject to the Employment Business and the Client being reasonably satisfied that the Staff has the required skills, qualifications and resources to provide the Consultancy Services to the required standard. 2.2 The Consultancy has the right, at its own expense, to enlist additional or substitute Staff in the performance of the Consultancy Services or may, sub-contract all or part of the Consultancy Services, provided that the consultancy provides details, whenever practicable, of the proposed substitute or sub contractor, ahead of the planned substitution and subject to the Employment Business and the Client being reasonably satisfied that such additional Staff or any such sub-contractor has the required skills, qualifications, resources and personnel to provide the Consultancy Services to the required standard. 2.3 Where the Consultancy provides a substitute or sub-contracts all or part of the Consultancy Services pursuant to clause 2.2 above, the Consultancy shall be responsible for paying the substitute or sub contractor and shall ensure that any agreement between the Consultancy and any such substitute or sub-contractor shall contain obligations which correspond to the obligations of the Consultancy under the terms of this Agreement and the Consultancy shall remain responsible for the acts or omissions of any such substitute or sub-contractor. 2.4 The Consultancy shall take all reasonable steps to avoid any unplanned changes of Staff assigned to the performance of the Consultancy Services but if the Consultancy is unable for any reason to perform the Consultancy Services the Consultancy should inform the Employment Business on the first day of unavailability and in such case shall provide a substitute subject to the provisions of clause 2.2. 2.5 Due to the specialised nature of the work there may be a lengthy learning process for any Staff prior to becoming familiar with the work. As a result where substitute or additional staff are provided or where the performance of all or part of the Consultancy Services is sub-contracted, the Consultancy shall provide wherever possible, at its own expense, an overlap period for such substitute or additional Staff or any such subcontractor. 2.6 In the event that the Consultancy is unable to supply either the original personnel or acceptable substitutes or sub contractors then the Employment Business is entitled to cancel this Agreement forthwith. 2.7 The Confirmation Note shall specify the Client, the fee payable by the Employment Business and such disbursements as may be agreed, and any other relevant information. 2.8 Save as otherwise stated in this Agreement, the Employment Business and the Client acknowledge and accepts that the Consultancy is in business on its own account and the Consultancy shall be entitled to seek, apply for, accept and perform contracts to supply its services to any third party during the term of this Agreement <<provided that this in no way compromises or is to the detriment to the performance of the Consultancy Services>>.
Engagement of Services Consultant shall perform the services described on Exhibit A attached hereto (the “Services”) for the Company to the best of Consultant’s ability. The Company selected Consultant to perform services for it based upon the Company receiving Consultant’s personal services. Consultant therefore may not subcontract or otherwise delegate its obligations under this Agreement without the Company’s prior written consent. Consultant shall provide the Services in a professional manner and in a manner reasonably satisfactory to the Company.
Contractor’s Services shall be performed in accordance with generally accepted professional practices and principles and in a manner consistent with the level of care and skill ordinarily exercised by members of Contractor’s profession currently practicing under similar conditions. Contractor shall comply with the profession’s standard of performance, applicable laws, regulations, and industry standards. By delivery of completed work, Contractor certifies that the work conforms to the requirements of this Agreement and all applicable federal, state and local laws. If Contractor is retained to perform services requiring a license, certification, registration or other similar requirement under California law, Contractor shall maintain that license, certification, registration or other similar requirement throughout the term of this Agreement.