Hosted Software. 2.12.1 We licence and allow certain of our authorised business partners to provide some of our software to customers using a hosting environment. By hosting environment we mean software installed on our own (or our authorised business partner’s) computers that your Users may access and use through the Internet. Where you access the Software via a hosting environment, you are responsible for maintaining your own access to the Internet to allow your Users to access the Software. You also agree that due to the nature of using software in this way there may be times when your Users are unable to access and use the Software (for example due to maintenance or circumstances beyond our control). Separate agreements may also relate to our Software where it is used in this way and your use of the Software will be subject to that separate agreement. If this Agreement and any separate agreement conflict in any way, then the separate agreement will be applicable on that particular issue.
2.12.2 If you have purchased a licence from your supplier to access our Software using its hosting environment, then your supplier (not us) is fully responsible for your access or inability to access our Software in this way and any related services that it provides.
Hosted Software. If the Software will be hosted by Frog, the Customer will:
7.1 ensure that each End User shall keep a secure password for his use of the Hosting Services and On-Line Documentation and that each End User shall keep his password confidential; and
7.2 only issue passwords which give administrative access to the Software and Hosting Services to appropriate End Users.
1.1 Through reference to the applicable Data Protection Laws, it is agreed that
1.1.1 The Customer is the Controller of all Personal Data required to fulfil the Agreement, and
1.1.2 Frog is the Processor of all Personal Data required to fulfil the Agreement
1.1.3 Where the Customer configures the Associated Products to Process Personal Data in addition to the Personal Data required in paragraph 15.1.1, the Customer shall assume the role of Processor for that data
1.2 Both parties shall:
1.2.1 ensure that appropriate technical and organisational measures are in place to safeguard Customer Personal Data against accidental or unlawful loss, alteration, unauthorised disclosure or access
1.2.2 Ensure that procedures are in place to notify the other party in reasonable time of any Data Incident relating to the Customer Personal Data being processed in the Associated Products as part of this Agreement. This notification shall include, to the extent possible, providing details of the Data Incident including steps taken to mitigate the potential risks and steps the notifying party would recommend that the other party takes to address the Data Incident
1.3 Frog shall:
1.3.1 comply with all applicable Data Protection Laws in the Processing of Customer Personal Data; and
1.3.2 only process Personal Data in accordance with Appendix 2; and
1.3.3 not Process Customer Personal Data other than on the relevant Customer’s written instruction unless Processing is required by Applicable Laws to which Frog is subject, in which case Frog shall inform the Customer of that legal requirement before the Processing of the Personal Data.
1.3.4 maintain Cyber Essentials certification to help ensure the effectiveness of the Supplier’s Security Measures
1.3.5 take appropriate steps to ensure compliance with the Security Measures by its employees, contractors and Sub-Processors to the extent applicable to their scope of performance;
1.3.6 inform the Customer if any instructions received from the Customer are thought to infringe the relevant Data Protection Legislation
1.3.7 maintain records to support compliance with the data pro...
Hosted Software. The Software will be hosted by Frog, the Customer will:
7.1 ensure that each End User shall keep a secure password for his use of the Hosting Services and On-Line Documentation and that each End User shall keep his/her password confidential; and
7.2 only issue passwords which give administrative access to the Software and Hosting Services to appropriate End Users.
Hosted Software. The element of the Xxxxx Application that runs on remote servers.
Hosted Software. 1. HOSTED ONLINE ACCESS Contractor shall deliver a hosted online access solution that uses HTTP and standard internet technologies to provide web-based access to the oblique aerial imagery acquired by the LAR-IAC and under perpetual license from Pictometry International Corp. Contractor will host and make the Oblique Images available to LAR-IAC participants through their hosted online access product. Contractor shall make best effort to ensure solution will be available 99.9% of the time. If County determines availability is not acceptable, Contractor shall allow termination of this subscription. The solution shall allow access to all prior LAR-IAC Oblique Images (2003, 2006, 2008, 2011, 2014, and 2017) under perpetual license from Pictometry. The solution will include the following capabilities:
a. LAR-IAC Master Account
1. Create/delete/update sub-organizations within the LAR-IAC project.
2. Create/delete/update users both within its organization and within sub- organizations.
3. Upload and manage GIS layers that shall be stored within the contractor’s computer systems, and displayed on the oblique imagery in the hosted solution.
Hosted Software. The Service Provider must ensure the Hosted Software is available for at least the following minimum availability percentage: [Insert description of Hosted Software] [Insert Availability] [Insert measurement period such as “monthly”] The availability of the Hosted Software will be calculated as the number of available hours during the measurement period, divided by the total number of hours during the measurement period.
Hosted Software the Software indicated as hosted on the Contract Information Sheet. Intellectual Property Rights: patents, utility models, rights to inventions, copyright and related rights, trade marks and service marks, trade names and domain names, rights in get-up, goodwill and the right to xxx for passing off or unfair competition, rights in designs, rights in computer software, database rights, rights to preserve the confidentiality of information (including know-how and trade secrets) and any other intellectual property rights, including all applications for (and rights to apply for and be granted), renewals or extensions of, and rights to claim priority from, such rights and all similar or equivalent rights or forms of protection which subsist or will subsist, now or in the future, in any part of the world. Licence: any licence or other agreement between us in respect of the licensing of all or any part of the Software. Non-Critical Fault: any reproducible fault in the Software other than a Critical Fault. Services: includes the Standard Support Service, the Updating Service and (if appropriate) the Hosting Service.
Hosted Software. If the Form includes Hosted Software, Informatica grants to Customer, for the Evaluation Period, a non-exclusive non-transferable revocable right to authorize Users to access and process data with those Hosted Software solely and exclusively for the purpose of Customer’s evaluation of the Software.
Hosted Software. The Service Provider is not responsible for providing Hosting services to the Client. OR The Service Provider will provide Hosting services to the Client as set out in Annexure 2 – Support Services. The following is only applicable if the Service Provider will be providing the Client with Hosting services. The Service Provider will: provide the Client with access to the Hosted Software in the manner specified in Annexure 2; provide and maintain the Hosting Infrastructure within Australia unless otherwise agreed by the Client; ensure that the Hosting Infrastructure is properly installed and configured, and otherwise complies with the requirements of this Agreement; notify the Client if it is changing the provider of any aspect of its Hosting Infrastructure; ensure that no unauthorised party is allowed physical or electronic access to the Hosted Software, the Hosting Infrastructure or the Client’s Data; implement reasonable steps to meet obligations including installing and maintaining adequate security features within the Hosted Software and on the Hosting Infrastructure; and implement and maintain, throughout the Term, appropriate and effective disaster Recovery Procedures, including appropriate back-up procedures and facilities, to ensure the Service Provider’s provision of the Hosted Software through the Hosting Infrastructure continues without interruption if a disaster occurs or affecting any Hosting Infrastructure. The Service Provider acknowledges that they must: provide to the Client, at the frequency agreed by both parties, an up to date copy of all of the Client’s Data which is held or used in or by the Hosted Software in an electronic format reasonably required by the Client; subject to the Support Services set out in Annexure 2 – Support Services Terms and Conditions, deliver to the Client the Client’s Data in the format and on media as reasonably requested by the within 10 business days after the effective date of termination or expiry of this Agreement; after the Service Provider has complied with the provisions under this clause, permanently delete any Client Data remaining on the Hosting Infrastructure, and on request certify in writing to the Client its compliance with this clause 17.4; and on request by the Client from time to time and subject to Annexure 2 – Support Services Terms and Conditions the Service Provider must: provide the Client with a copy of the Disaster Recovery Procedures; promptly make changes to the Disaster Recovery Pro...
Hosted Software. 11.1 Active will provide Client with access to hosted versions of the Products identified in the applicable Schedule and associated Online Services, and Active hereby grants to Client a limited, non-exclusive, non-transferable license to use the Hosted Software in accordance with the applicable documentation.
11.2 Active represents and warrants to Client that: (i) the Hosted Software shall perform materially in accordance with the documentation and user guides; and (ii) it will use commercially reasonable virus detection computer software programs to test the Hosted Software licensed hereunder for viruses prior to delivery to Client and that Active will continue to take such steps with respect to any code delivered to Client to correct any identified error. Active further warrants to Client that it is not the policy of Active to intentionally include disabling mechanisms or computer viruses into software provided to the Client and that should such policy change, Active will advise Client in advance and, upon Client’s request, will provide Client with the code(s) necessary to defeat any such disabling mechanisms or computer viruses, intentionally inserted by Active or its employees into the Hosted Software.
11.3 Client acknowledges that Active: (a) does not monitor or police communications or data transmitted through the Hosted Software or Online Services by Client or any third party, or any communications or data transmitted by any third party suppliers through the Hosted Software or Online Services; (b) shall not be responsible for the content of any such communication or transmission; (c) shall have no liability of any kind with respect to any materials or information that Client inputs into or transmits, publishes, or distributes through the Hosted Software or Online Services; and (d) may remove or modify any such communication or transmission deemed offensive for which Active has received more than one complaint.
11.4 Scheduled maintenance of the Hosted Software generally occurs during non-peak hours within the hours of 11PM to 6AM.