Data Mapping Sample Clauses

Data Mapping. Neither the Servicer nor the Backup Servicer is aware of any fact that would cause such Person reasonably to believe that the Servicer's servicing data cannot be mapped from the Servicer's system to the Backup Servicer's system.
AutoNDA by SimpleDocs
Data Mapping. As part of, or immediately following the “IA Walkthrough”, Amdocs and Company will perform data mapping analysis. The output of data mapping analysis is a complete data dictionary document prepared by Amdocs as part of the Implementation and Migration Services detailing the relationship between the data in the Legacy Systems and the Amdocs Systems.
Data MappingThe Adviser may periodically perform a data mapping exercise to examine and document the categories of CA Personal Information that are collected, where such CA Personal Information is stored, with whom such CA Personal Information is shared and when and how such CA Personal Information is used and deleted.
Data Mapping. Within ninety (90) days of the Closing Date, the Trustee, as backup Servicer pursuant to Section 10.03 of the Contribution and Servicing Agreement, shall (1) in order to understand the purpose of each data field (and the interrelationships among such data fields) set forth in the computer software used by the Servicer in connection with the servicing of each Contract and the related Trust Property, review the computer software used by the Servicer in connection with the servicing of each Contract and the related Trust Property and (2) in order to be able to independently generate any Monthly Servicer Report, develop a computer program that (x) recognizes the data fields (and the interrelationships among them) used by the Servicer and (y) permits the data set forth in a Monthly Servicer Report to be downloaded for use by such computer program. Upon its receipt of an electronic copy of the Monthly Servicer Report, the Trustee shall download the data contained in such Monthly Servicer Report into the computer program and, using such computer program, it shall generate a copy of such Monthly Servicer Report for its own records. Commencing in June 2003 and for the first calendar month in each quarter thereafter, with respect to the data provided by the Servicer to the Trustee, the Trustee shall compare the Monthly Servicer Report provided by the Servicer in respect of the related calendar month to the Monthly Servicer Report generated by the Servicer for the same calendar month. The Trustee shall report to the Servicer any discrepancies between the Monthly Servicer Report generated by the Servicer and the Monthly Servicer Report generated by the Trustee and shall require that the Servicer reconcile any discrepancies between such Monthly Servicer Reports.
Data Mapping. 7.1. The Licensor and School Suppliers will use the Software to carry out a data mapping exercise which includes, but is not limited to identifying: (a) the legal basis of the Personal Data processed; (b) how they meet the rights of the Data Subject; (c) how your Personal Data is stored; (d) how your Personal Data is distributed; (e) how the Personal Data is secured; (f) for what purposes the Personal Data is processed; (g) the type of Personal Data that is collected; (h) how the Personal Data is accessed; and (i) The Licensor/ School Suppliers’ retention policy. 7.2. The data maps produced by the Licensor and the School Suppliers pursuant to clause 7.1 above will be available to you via your GDPRiS Account. 7.3. It will be at the discretion of the School Suppliers to carry out the data mapping exercise referred to in clause 7.1 above.
Data Mapping. The translation of data from or to 1) ANSI X12 ------------ standard communication protocol or 2) some other proprietary communication protocol standard between Customer Subscriber and Vendor Subscriber to effect data transmission via InterChange Services.

Related to Data Mapping

  • Data Mining 4.1. Provider agrees not to use GLO Data for unrelated commercial purposes, advertising or advertising-related services, or for any other purpose not explicitly authorized by the GLO in this Contract or any document related thereto. 4.2. Provider agrees to take all reasonably feasible physical, technical, administrative, and procedural measures to ensure that no unauthorized use of GLO Data occurs.

  • Data Management Contractor will not use State data, including production data, for testing or development purposes unless authorized in writing by the State Chief Information Security Officer or delegate. Contractor will implement and maintain procedures to physically and logically segregate State data, unless otherwise explicitly authorized by the State Chief Information Security Officer or delegate.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!