End Users LICENSEE agrees to require all direct recipients of Licensed Products to whom Licensed Products are sold, leased, or otherwise disposed of by LICENSEE or its sublicensees, to look only to LICENSEE and not to LICENSOR or its affiliates for any claims, warranties, or liability relating to such Licensed Products. LICENSEE agrees to take all steps to reasonably assure itself that Licensed Products sold, leased or otherwise disposed of by or for LICENSEE is being used for permitted purposes only.
Acceptance Testing The MCP must have the capability to report all elements in the Minimum Data Set as set forth in the ODJFS Encounter Data Specifications and must submit a test file in the ODJFS-specified medium in the required formats prior to contracting or prior to an information systems replacement or update. Acceptance testing of encounter data is required as specified in Section 29(a)(v) of this Appendix.
Product Testing Upon request, Customer shall provide Operator a laboratory report for each Product delivery by Customer or Customer’s supplier. Operator will not be obligated to receive Contaminated Product for throughput through the Pipelines, nor will Operator be obligated to accept Product that fails to meet the applicable quality specifications for the Berths under the BAUTA and any Terminal Service Orders issued thereunder.
Performance Tests Contractor shall perform Performance Tests in accordance with Section 11.2 of the Agreement and Attachment S.
Stability Testing Patheon may be requested to conduct stability testing on the Products in accordance with the protocols set out in the Specifications for the separate fees and during the time periods set out in Schedule C to a Product Agreement. Patheon will not make any changes to these testing protocols without prior written approval from Client. If a confirmed stability test failure occurs, Patheon will notify Client within one Business Day, after which Patheon and Client will jointly determine the proceedings and methods to be undertaken to investigate the cause of the failure, including which party will bear the cost of the investigation. Patheon will not be liable for these costs unless it has failed to perform the Manufacturing Services in accordance with the Specifications, cGMPs, and Applicable Laws. Patheon will give Client ail stability test data and results at Client’s request.
USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.
Supplier Selection If Customer selects a seat or galley supplier that is not on the Boeing recommended list, such seat or galley will become BFE and the provisions of Exhibit A, Buyer Furnished Equipment Provisions Document, of the AGTA will apply.
Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.
Service Levels (1) DTI shall perform the Services in accordance with the service levels (the "Service Levels") as may be agreed to from time to time in writing by DTI and the Funds (the "Service Level Agreement"). Failure to perform in a manner which equals or exceeds the Service Levels shall result in fee credits ("Fee Credits") or the Funds' right to terminate this Agreement, as set forth in the Service Level Agreement.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.