Data Dump Sample Clauses

Data Dump. Data Dump:
AutoNDA by SimpleDocs
Data Dump. (a) A Data Dump in Amadeus’ proprietary XML format is available for download at noon on the first day of a Subscription Term renewal at no additional charge. (b) Data Dumps are available at other times for a fee, which would be mutually agreed upon by the parties in an Order Form.
Data Dump. Upon Agreement expiration or termination of the Agreement, Contractor will immediately provide to the City electronic copies of the data collected and recorded. Data format will be agreed upon by both City and Contractor, but at a minimum, data records will be provided in ASCII comma, separated value (csv) format, with binary images in TIFF, JPG, or PDF format.
Data Dump. (a) A Data Dump in Amadeus’ proprietary XML format is available for download at noon on the first day of a Subscription Term renewal at no additional charge. (b) Data Dumps are available at other times for a fee, which would be mutually agreed upon by the parties in an Order Form. Customer acknowledges that the following End-User Terms of Use (“End-User Terms”) apply only to the Sertifi online software application set forth on any applicable Order Form (“Sertifi”). The parties agree that in the event that any terms in the Master Subscription Agreement conflict with the terms set forth herein, these End-User Terms shall govern solely with respect to Customer’s use of the Sertifi product. 1. S ervices. During the term of the Order Form Sertifi shall provide to Customer an internet web-based closing automation solution which allows the Users thereof to create, send, and present to third party email addresses requests for electronic signatures, facilitate document exchange and collaboration on documents, allows Users to electronically sign documents or fax handwritten signatures and facilitate secure transactions to a payment gateway to collect and process payments for the Products offered by Customer via the Software provided by Sertifi (hereinafter referred to as the “Services”). 2. E nforcement of Electronic Signatures. The Services are limited to delivery of documents and capturing and applying electronic and handwritten signatures to documents. Sertifi provides E-Sign Act (Electronic Signatures in Global and National Commerce Act, 15 U.S.C. §§ 7001 et seq.) and UETA (Uniform Electronic Transactions Act) compliant solutions that enables its Customers and their End Users to send and sign documents securely with the same legal equivalency of a handwritten signature. Certain types of documents are excluded from electronic signature laws and various agencies and certain laws may have promulgated specific regulations that apply to electronic signatures and electronic records. The Customer has the sole obligation to determine the enforceability of any particular document signed with an electronic signature , the risks as to the identity of the users signing with the use of electronic signature, to provide each party to a consumer transaction with any disclosure or explanation required by law concerning the utilization of electronic signatures and the use of the Services, to provide paper copies of documents if requested, and to draft its documents to accommodate...

Related to Data Dump

  • Monthly Data Download Not later than fifteen (15) days after the end of each month, beginning with the month in which the Commencement Date occurs and ending with the Final Shared-Loss Recovery Month, Assuming Bank shall provide Receiver:

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Electronic Visit Verification ("EVV A. To ensure: 1. the EVV system is used to verify the provision of services governed under 40 TAC, Chapter 68 or its successor; 2. only authorized people access the Contractor's EVV account; 3. all data elements required by HHSC or HHSC's designee are uploaded or entered and maintained in the EVV system completely, accurately, and prior to submitting the claim; 4. that each time services governed by 40 TAC Chapter 68 or its successor are delivered to an individual, the Contractor's staff uses an HHSC-approved EVV system; and 5. service delivery documentation is immediately available for review by HHSC when requested. B. Equipment provided to Contractor by HHSC, HHSC’s designee, or an HHSC-approved EVV vendor, must be returned in good condition when the equipment is no longer needed under this Contract. In the context of this agreement, “good condition” means Contractor must not place any marks or identifying information on the equipment and may not alter information on the equipment including logos and serial numbers. If the equipment is lost, stolen, marked, altered or damaged by Contractor, Contractor may be required to pay the replacement cost for each piece of equipment that is lost, stolen, marked or damaged. Replacement costs for lost, stolen, marked or damaged equipment may be assessed periodically. If Contractor recovers previously lost or stolen equipment for which Contractor paid the replacement cost in the prior 12 months, Contractor may return the equipment and be reimbursed for the replacement costs within 12 months of the date HHSC, HHSC’s designee or an HHSC-approved EVV vendor (as applicable) received payment in full from the Contractor. This is provided the equipment is returned in good condition as specified above. C. HHSC may perform EVV compliance oversight reviews to determine if Contractor has complied with EVV compliance requirements as outlined in 40 TAC Chapter 68 or its successor, EVV Policy posted on the HHSC EVV website or EVV Policy Handbook. D. If the Contractor determines an electronic record in the EVV system needs to be adjusted at any time, the Contractor will make the adjustment in the EVV system using the most appropriate EVV reason code number(s), EVV reason code description(s) and enter any required free text when completing visit maintenance in the EVV system, if applicable. E. Contractor must begin using an HHSC-approved EVV system prior to submitting an EVV relevant claim. F. All claims for services required to use EVV (EVV claims) must match to an accepted EVV visit transaction in the EVV Aggregator (the state’s centralized EVV database) prior to reimbursement of an EVV claim. Without a matching accepted EVV visit transaction, the claim will be denied. G. Contractor must submit all EVV related claims through the Texas Medicaid Claims Administrator, or as otherwise described in the EVV Policy posted on the HHSC EVV website or in the EVV Policy Handbook. H. Contractor must complete all required EVV training as outlined in the EVV Policy posted on the HHSC EVV website or EVV Policy Handbook: • Prior to using either an EVV vendor system or an EVV proprietary system and • Yearly thereafter. I. Contractor and, if applicable, the Contractor’s appointed EVV system administrator, must complete, sign and date the EVV Onboarding Form as outlined in 40 TAC Chapter 68 or its successor, EVV Policy posted on the HHSC website or EVV Policy Handbook.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!