End User’s Representations Regarding Its Data, Infrastructure and Systems Sample Clauses

End User’s Representations Regarding Its Data, Infrastructure and Systems. End User acknowledges that Xxxxxxxxx will rely on, the timeliness, accuracy, completeness and legality of all End User Data and information provided to Carahsoft. End User will obtain any licenses or consents from, third parties as required in connection with the transfer, use and processing of End User Data. End User grants to Carahsoft and its subcontractors a non- exclusive right to use the End User Data to provide the Services under this Agreement. End User represents that it is not aware of any on-going or potential network breach or compromise to the system(s) it owns or manages that are relevant to the Services and will promptly notify Carahsoft if it becomes aware of any such network breach or other compromise during Service delivery.
AutoNDA by SimpleDocs

Related to End User’s Representations Regarding Its Data, Infrastructure and Systems

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

Time is Money Join Law Insider Premium to draft better contracts faster.