Database Setup Sample Clauses

Database Setup. All existing backflow assemblies registered by the City to be added to the online database by Contractor’s staff. This information is garnered from the City’s existing database and past test reports, as well as any additional backflow data discovered during inspections and surveys.
AutoNDA by SimpleDocs

Related to Database Setup

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Setup Parties mutually agree to meet and fulfill implementation requirements as specified and set forth as follows. To facilitate a fast and effective implementation, eLuma will be responsible for the following: 1. Assigning an implementation specialist who will lead the implementation project, ensure that eLuma and Partner tasks are completed in a timely manner, and make sure all parties are coordinated so that Services and Software access can begin as quickly as possible. 2. Assigning an information technology specialist who will assist with Site(s) configuration and setup in accordance with the Services and Software outlined in this Agreement. 3. Recruiting, hiring, onboarding and credentialing, training, and staffing the Partner needs as outlined in this Agreement. 4. Providing a copy of the fully executed Agreement, signed W-9, and the Professional and General Liability insurance to Partner upon request. 5. Training adult supervisors (also known as “Facilitators”) and creating a one-page document for each Site’s Facilitator including, but not limited to: 1. Logging into the eLuma’s software system. 2. Turning on the webcam, microphone, and audio. 3. Basic troubleshooting webcam, microphone, and audio issues. 4. How to contact the technical support team. 6. Creating the therapy schedule with the support of the Partner, or support the Partner in creating the therapy schedule. 7. Ordering and shipping Equipment upon the request of the Partner and invoicing in accordance with this Agreement. To facilitate a fast and effective implementation, Partner shall be responsible for the following before or during the implementation process with eLuma: 1. Assigning a main point of contact (“Implementation Champion”) for the Partner during implementation. The Implementation Champion will ensure that Partner tasks are completed in a timely manner and that the implementation stays on schedule. 2. Assigning an Information Technology specialist and providing a phone number and email in order to set up working computers, webcams, microphones, audio, and/or Ethernet connections at each Site used in conjunction with Services. 3. Providing caseload information including, but not limited to the number of Students requiring Services, minutes of Services, and group therapy session size. (Note: groups sessions are not to exceed four (4) Students at a time and no more than two (2) Students per computer.) 4. Providing the name(s) of each Site and Facilitator for each Site where Services will take place, along with each Facilitator’s best phone number and email address. 5. Providing access to Student Individualized Education Plans (“IEPs”) by software access, fax, or password protected pdf. 6. Providing current copies of the academic calendar, along with special scheduling considerations. 7. Providing support in creating the therapy schedule.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!