Business Services Professional Services
Surgery Services This plan covers surgery services to treat a disease or injury when: • the operation is not experimental or investigational, or cosmetic in nature; • the operation is being performed at the appropriate place of service; and • the physician is licensed to perform the surgery. This plan covers reconstructive surgery and procedures when the services are performed to relieve pain, or to correct or improve bodily function that is impaired as a result of: • a birth defect; • an accidental injury; • a disease; or • a previous covered surgical procedure. Functional indications for surgical correction do not include psychological, psychiatric or emotional reasons. This plan covers the procedures listed below to treat functional impairments. • abdominal wall surgery including panniculectomy (other than an abdominoplasty); • blepharoplasty and ptosis repair; • gastric bypass or gastric banding; • nasal reconstruction and septorhinoplasty; • orthognathic surgery including mandibular and maxillary osteotomy; • reduction mammoplasty; • removal of breast implants; • removal or treatment of proliferative vascular lesions and hemangiomas; • treatment of varicose veins; or • gynecomastia.
Verizon OSS Services 8.2.1 Upon request by ECI, Verizon shall provide to ECI Verizon OSS Services. Such Verizon OSS Services will be provided in accordance with, but only to the extent required by, Applicable Law. 8.2.2 Subject to the requirements of Applicable Law, Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services that will be offered by Verizon, shall be as determined by Verizon. Subject to the requirements of Applicable Law, Verizon shall have the right to change Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services, from time-to-time, without the consent of ECI. 8.2.3 To the extent required by Applicable Law, in providing Verizon OSS Services to ECI, Verizon will comply with Verizon’s applicable OSS Change Management Guidelines, as such Guidelines are modified from time-to-time, including, but not limited to, the provisions of the Guidelines related to furnishing notice of changes in Verizon OSS Services. Verizon’s OSS Change Management Guidelines will be set out on a Verizon website.
Witness Services At all times from and after the Separation Time, each of Air Products and Versum shall use its commercially reasonable efforts to make available to the other, upon reasonable written request, its and its Subsidiaries’ officers, directors, employees and agents (taking into account the business demands of such individuals) as witnesses to the extent that (i) such Persons may reasonably be required to testify in connection with the prosecution or defense of any Action in which the requesting Party may from time to time be involved (except for claims, demands or Actions in which one or more members of one Group is adverse to one or more members of the other Group) and (ii) there is no conflict in the Action between the requesting Party and the other Party. A Party providing a witness to the other Party under this Section 7.4 shall be entitled to receive from the recipient of such witness services, upon the presentation of invoices therefor, payments for such amounts, relating to supplies, disbursements and other out-of-pocket expenses (which shall not include the costs of salaries and benefits of employees who are witnesses or any pro rata portion of overhead or other costs of employing such employees which would have been incurred by such employees’ employer regardless of the employees’ service as witnesses), as may be reasonably incurred and properly paid under applicable Law.
Beta Services From time to time, We may invite You to try Beta Services at no charge. You may accept or decline any such trial in Your sole discretion. Beta Services will be clearly designated as beta, pilot, limited release, developer preview, non-production, evaluation or by a description of similar import. Beta Services are for evaluation purposes and not for production use, are not considered “Services” under this Agreement, are not supported, and may be subject to additional terms. Unless otherwise stated, any Beta Services trial period will expire upon the earlier of one year from the trial start date or the date that a version of the Beta Services becomes generally available. We may discontinue Beta Services at any time in Our sole discretion and may never make them generally available. We will have no liability for any harm or damage arising out of or in connection with a Beta Service.
SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.
Our Services As insurance intermediaries we generally act as the agent of our client. We are subject to the law of agency, which imposes various duties on us. However, in certain circumstances we may act for and owe duties of care to other parties, including the insurer. We will advise you when these circumstances occur, so you will be aware of any possible conflict of interest. We offer a wide range of products and services which may include: • Offering you a single or range of products from which to choose a product that suits your insurance needs; • Advising you on your insurance needs; • Arranging suitable insurance cover with insurers to meet your requirements; • Helping you with any subsequent changes to your insurance you have to make; • Providing all reasonable assistance with any claim you make. In some cases, we act for insurers under a delegated authority agreement and can enter into insurance policies, issue policy documentation and/or handle or settle claims on their behalf. Where we act on behalf of the insurer and not you, we will notify you accordingly and in relation to claims we will advise you of this fact when you notify us of a claim. Notwithstanding this, we endeavour to always act in your best interest. As intermediaries, we offer a wide range of insurance products and have access to many leading insurance companies and the Lloyd’s market. Depending on the type of cover you require and where we have provided advice based on a personal recommendation, we will offer you a policy from either: • a single insurer; • a limited range of insurers; or • a fair analysis that is representative of the insurance market. We will advise you separately as to which of these apply before we arrange your policy and where we have not undertaken a fair analysis of the market, we will provide you with a list of insurers considered. Jensten Retail Consumer Client TOBA Version 1.0 Nov 2021 Policies taken out, amended, or renewed through our online service will be on a non-advised basis. This means sufficient information will be provided for you to make an informed decision about any product purchased online and you should therefore ensure that any policy provides the cover you require and is suitable for your needs. For Motor Vehicle insurance we require customers to pay an additional charge for our claims service – Coversure Claimsline (details are provided in a separate document). This is a “one-stop” service that enables us to assist you with any claim you may incur. The cost of the Coversure Claimsline services will be included in the price quoted to you for the Motor Vehicle insurance and shown separately in your documentation. By purchasing motor insurance from us, you authorise Coversure and its agents to take all necessary actions to handle your claim including dealing with your insurers, third parties and their insurers and other service suppliers on your behalf. For all other policies, including optional additional products and premium finance (if relevant), before the insurance contract is concluded and after we have assessed your demands & needs, we will provide you with advice and make a personal recommendation. This will include sufficient information to enable you to make an informed decision about the policy that we have recommended, together with a quotation which will itemise any fees that are payable in addition to the premium. This documentation will also include a statement of your demands and needs. You should read this carefully as it will explain reasons for making the recommendation we have made.
Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.
Outside Services Consultant shall not use the service of any other person, entity, or organization in the performance of Consultant’s duties without the prior written consent of an officer of the Company. Should the Company consent to the use by Consultant of the services of any other person, entity, or organization, no information regarding the services to be performed under this Agreement shall be disclosed to that person, entity, or organization until such person, entity, or organization has executed an agreement to protect the confidentiality of the Company’s Confidential Information (as defined in Article 5) and the Company’s absolute and complete ownership of all right, title, and interest in the work performed under this Agreement.
Cloud Services You will not intentionally (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively impacts the Cloud Service’s operation; or (d) submit any information that is not contemplated in the applicable Documentation.