Data Storage, Access, and Location Sample Clauses

Data Storage, Access, and Location. Off Shore Restrictions. Contractor may conduct help desk, support services, and software development and testing activities under this Contract from any location convenient to Contractor, except that the Parties agree that: (a) all NYS Confidential Information shall remain within and may not be stored, or accessed from, outside of the Continental United States (CONUS); and (b) unless expressly agreed to in writing in a specific Transaction Document approved by an ITS authorized signatory adhering to established ITS practices, Contractor shall not have remote access into ITS' information technology systems.
AutoNDA by SimpleDocs
Data Storage, Access, and Location. Off Shore Restrictions. Contractor may conduct help desk, support services, and software development and testing activities under this Agreement from any location convenient to Contractor, except that the Parties agree that: (a) all BRETSA Confidential Information shall remain within and may not be stored, or accessed from, outside of the Continental United States (CONUS); and (b) unless expressly agreed to in writing in a specific Transaction Document approved by a BRETSA authorized signatory adhering to established BRETSA practices, Contractor shall not have remote access into BRETSA' information technology systems. All access to BRETSA Confidential Information, physical or virtual, must be conducted within CONUS and have adequate security systems in place to protect against the unauthorized access to Contractor Facilities and Confidential Information stored therein, including at a minimum two-factor authentication acceptable to BRETSA. The Contractor shall not send or permit to be sent to any location outside of the CONUS any BRETSA Confidential Information related to this Agreement. To the extent support by Contractor requires replication of a set of conditions such as a software crash event, Contractor shall replicate that set of conditions in its own environment when providing support, while communicating with BRETSA technical personnel. For software development activities, such as patches, updates, or adding new functionality, Contractor shall conduct that software development within its own Development, Quality Assurance, and Production Environments, and, when ready, shall package and provide it through an agreed-to Internet-based location, from which BRETSA technical personnel will download such software, and install and test it in BRETSA 's information technology environment. To the extent Contractor (or, any Subcontractors allowed by BRETSA) requires access to BRETSA or Contractor system or application audit logs for support and troubleshooting, Contractor or such Subcontractors will maintain such logs only within CONUS, will take the strictest measures to ensure such logs do not contain BRETSA Confidential Information including production data, and will maintain such logs in a secure environment subject to audits by BRETSA.

Related to Data Storage, Access, and Location

  • Data Location 1.1. The CONTRACTOR shall not store or transfer non-public COUNTY data outside of the United States. This includes backup data and Disaster Recovery locations. The CONTRACTOR will permit its personnel and contractors to access COUNTY data remotely only as required to provide technical support. (Remote access to data from outside the continental United States is prohibited unless approved in advance and in writing by the County.) 1.2. The CONTRACTOR must notify the COUNTY in advance and in writing of any location changes to CONTRACTOR’s data center(s) that will process or store County data.

  • Ownership and Location of Metering Equipment The Metering Equipment to be constructed, the capability of the Metering Equipment to be constructed, and the ownership thereof, are identified on the attached Schedule C to this ISA.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Closing Date and Location The Transaction will be completed at 10:00 a.m. (Pacific time) on the Closing Date, at the offices of the Purchaser’s Solicitors, or at such other location and time as is mutually agreed to by the Purchaser and the Target. Notwithstanding the location of the Closing, each party agrees that the Closing may be completed by the exchange of undertakings between the respective legal counsel for the Purchaser and the Target, provided such undertakings are satisfactory to each party’s respective legal counsel.

  • UNDERGROUND LOCATIONS Prior to the Company commencing any work the Customer must advise the Company of the precise location of all underground services on the site and clearly xxxx the location. The underground mains and services the Customer must identify include, but are not limited to, telephone cables, fibre optic cables, electrical services, gas services, sewer services, pumping services, sewer connections, sewer sludge mains, water mains, irrigations pipes, oil pumping mains and any other services that may be on site. Whilst the Company will take all care to avoid damage to any underground services the Customer agrees to indemnify the Company in respect of all any liability claims, loss, damage, cost and fines as a result of damage to services not precisely located and notified pursuant to this clause.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

  • Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!