End of Life Your right to use or obtain Support for the Software, and any Software features is subject to Our End-of-Life Policy. Upon the End-of-Life date of a Software Product or any feature of a Software Product (as We determine in accordance with the End-of-Life Policy), Your right to use or obtain Support for the Software or Software feature shall terminate.
System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
ACCEPTANCE/REJECTION/CANCELLATION The County reserves the right to accept or to reject any or all bids and to make the award to that bidder who, in the opinion of the County, will be in the best interest of and/or the most advantageous to the County. The County also reserves the right to reject the bid of any bidder who has previously failed in the proper performance of an award or to deliver on time contracts of a similar nature or who, in the County’s opinion, is not in a position to perform properly under this award. The County reserves the right to inspect all facilities of bidders in order to make a determination as to the foregoing. The County reserves the right to waive any irregularities and technicalities and may, at its discretion, request a re- bid. Award will be made to the lowest responsive and responsible bidder as determined by the County. The County reserves the right, and the Manager, Procurement Division has absolute and sole discretion, to cancel a solicitation at any time prior to approval of the award by the Board of County Commissioners when such approval is required. The decision to cancel a solicitation cannot be the basis for a protest pursuant to the Orange County Code.
System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.
Provisioning 2.4.1 BellSouth shall provision services during its regular working hours. To the extent OneTone requests provisioning of service to be performed outside BellSouth’s regular working hours, or the work so requested requires BellSouth’s technicians or project managers to work outside of regular working hours, overtime charges set forth in BellSouth’s intrastate Access Services Tariff, Section E13.2, shall apply. Notwithstanding the foregoing, if such work is performed outside of regular working hours by a BellSouth technician or project manager during his or her scheduled shift and BellSouth does not incur any overtime charges in performing the work on behalf of OneTone, BellSouth will not assess OneTone additional charges beyond the rates and charges specified in this Agreement. 2.4.2 In the event BellSouth must dispatch to the End User’s location more than once due to incorrect or incomplete information provided by OneTone (e.g., incomplete address, incorrect contact name/number, etc.), BellSouth will xxxx OneTone for each additional dispatch required to provision the circuit due to the incorrect/incomplete information provided. BellSouth will assess the applicable Maintenance of Service rates from BellSouth’s XXX Xx. 0 Xxxxxx, Xxxxxxx 13.3.1.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Start-Up and Synchronization Consistent with the mutually acceptable procedures of the Developer and Connecting Transmission Owner, the Developer is responsible for the proper synchronization of the Large Generating Facility to the New York State Transmission System in accordance with NYISO and Connecting Transmission Owner procedures and requirements.
Purchase Order Duration Purchase orders issued pursuant to this State Term Contract must be received by the Contractor no later than close of business on the last day of the Contract’s term to be considered timely. The Contractor is obliged to fill those orders in accordance with the Contract’s terms and conditions. Purchase orders received by the Contractor after close of business on the last day of the State Term Contract’s term shall be considered void. Purchase orders for a one-time performance of contractual services shall be valid through the performance by the Contractor, and all terms and conditions of the State Term Contract shall apply to the single delivery/performance, and shall survive the termination of the Contract. Contractors are required to accept purchase orders specifying delivery schedules exceeding the contracted schedule even when such extended delivery will occur after expiration of the State Term Contract. For example, if a state term contract calls for delivery 30 days after receipt of order (ARO), and an order specifies delivery will occur both in excess of 30 days ARO and after expiration of the state term contract, the Contractor will accept the order. However, if the Contractor expressly and in writing notifies the ordering office within ten (10) calendar days of receipt of the purchase order that Contractor will not accept the extended delivery terms beyond the expiration of the state term contract, then the purchase order will either be amended in writing by the ordering entity within ten (10) calendar days of receipt of the contractor’s notice to reflect the state term contract delivery schedule, or it shall be considered withdrawn. The duration of purchase orders for recurring deliveries of commodities or performance of services shall not exceed the expiration of the State Term Contract by more than twelve months. However, if an extended pricing plan offered in the State Term Contract is selected by the Customer, the Contract terms on pricing plans shall govern the maximum duration of purchase orders reflecting such pricing plans. Timely purchase orders shall be valid through their specified term and performance by the Contractor, and all terms and conditions of the State Term Contract shall apply to the recurring delivery/performance as provided herein, and shall survive the termination of the Contract. Ordering offices shall not renew a purchase order issued pursuant to a State Term Contract if the underlying contract expires prior to the effective date of the renewal.
Nonconforming Work 5.6.1 Rejection, Removal and Replacement of Nonconforming Work
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.