Hosted Solutions Sample Clauses

Hosted Solutions. This Section 5 shall apply in addition to all other sections ONLY if Customer is purchasing Hosted Solutions: 5.1 In addition to the above, the following provisions shall apply in connection with the Hosted Solutions: 5.1.1 Software Definition shall include the AlgoSec Hosted Solutions as hosted by the Service Hosting Facility. 5.1.2 License pursuant to Section 2.1 shall include license to the Hosted Solutions. 5.1.3 Copies pursuant to Section 2.3 is not permitted for Hosted Solutions which may be accessed solely through the Service Hosting Facility and may not be hosted or sub hosted in anyway or manner. 5.1.4 Audit pursuant to Section 2.5, in connection with the Hosted Solutions may include means within the Service Hosting Facility. 5.1.5 In addition to the above Restrictions, in connection with the Hosted Solutions, Customer shall use the Hosted Solutions in compliance with applicable law and shall not: (A) send or store infringing or unlawful material or malicious code; (B) attempt to gain unauthorized access to, or disrupt the integrity or performance of, the Hosted Solutions or the data contained therein; (C) access the Hosted Solutions for the purpose of building a competitive product or service or copying its features or user interface or for purposes of product evaluation, benchmarking or other comparative analysis or permit access to the Hosted Solutions by a direct competitor of Algosec. 5.1.6 Warranty pursuant to Section 8 to the Hosted Solutions shall commence at the time of delivery of the access link to the Hosted Solutions. 5.1.7 IN ADDITION TO ALL OF WARRANTIES SET IN SECTION 8, CUSTOMER HEREBY NOTES AND CONFIRMS THAT IT IS AWARE THAT THE HOSTED SOLUTIONS MAY BE TEMPORARILY UNAVAILABLE, INCLUDING FOR MAINTENANCE, WHETHER SCHEDULED OR NOT, EITHER BY ALGOSEC OR BY THIRD PARTY PROVIDERS, OR BECAUSE OF OTHER CAUSES BEYOND ALGOSEC'S REASONABLE CONTROL, AND ALGOSEC SHALL NOT BE LIABLE FOR ANY SUCH DISRUPTIONS. 5.1.8 CUSTOMER ACKNOWLEDGES THAT IT IS AWARE THAT THE HOSTED SOLUTIONS IS PROVIDED THROUGH SERVICE HOSTING FACILITY AND ALGOSEC DOES NOT WARRANT ANYTHING THAT IS OUT OF ITS DIRECT CONTROL. IN ADDITION TO THE TERMS AND CONDITIONS IN THIS AGREEMENT, THE HOSTED SOLUTIONS WILL BE PROVIDED TO CUSTOMER SUBJECT TO THE SERVICE HOSTING FACILITY'S THEN APPLICABLE TERMS OF USE WITH NO LIABILITY ON ALGOSEC'S BEHALF AND UNDER CUSTOMER'S SOLE AND EXCLUSIVE LIABILITY AND FULL UNDERTAKING TO FULLY INDEMNIFY ALGOSEC FOR ANY BREACH OR CLAIMS WITH REGARDS TO...
AutoNDA by SimpleDocs
Hosted Solutions. If GDI or its designated third-party providers are hosting the Software, the following additional terms and conditions apply: (a) GDI or its designated provider will provide those services necessary to allow you Access, including a password(s).
Hosted Solutions. Hosted solutions, including but not limited to hosted email and document-related applications, may require Client to accept the terms of a third party XXXX, which may contain service levels, warranties and/or liability limitations that are different than those contained in this Agreement. Client agrees to be bound by the terms of such EULAs and shall look only to the applicable third party provider for the enforcement of the terms of such EULAs. Client will defend, indemnify, and hold Company harmless from any claims and Damages resulting from any breach of such a XXXX by Client or any of its directors, officers, employees, or agents. Company reserves the right to suspend or terminate Client’s access to hosted solutions in the event that Company has reason to believe that the hosted solutions are being accessed, used or otherwise manipulated in a manner that violates any Law, or poses a threat to the integrity or security of Company’s computer servers or any third party server.
Hosted Solutions. The hosted service is located at a tier 3 data centre and is comprised of enterprise standard resilient hardware. Hosted Services include telephony, wireless and data backup. These services are provided via cloud technology where the hardware, software and management are all remotely provided. The support of Hosted Services does not as standard include support for switches, routers cabling and network services (unless these have been purchased from VSL with the necessary support packages). Next working day, replacement handset cover can be supplied. Please ask your account manager for details. 6.1 Hosted Support Agreements 6.2 Network Maintenance
Hosted Solutions. You may also make the Solution available to Customers via a Hosted Solution arrangement. A Hosted Solution means providing access to the Solution from remote data centers to multiple Customers via the internet or a private network. Hosting terms for Appliances are set forth in the Appliance Attachment. For Programs, IBM grants you a nonexclusive, nontransferable, right to authorize Customers to access and use eligible Programs solely as part of the Solution, only in connection with your provision of the Hosted Solution to such Customer. You may not use the Programs you license for providing a Hosted Solution for any other purpose, including internal use. The licenses may not be resold, assigned or transferred to any other entity, except as provided under 7.8 of the Base Agreement or as otherwise authorized by IBM. You may permit Customers to access Programs as part of your Hosted Solution in the countries set forth in 2.8 of the Base Agreement where IBM has exclusive dealing arrangements, provided that the Programs are not distributed into or installed in those countries. All copies of the Programs used to provide the Hosted Solution must always reside on your servers, or servers you manage. You must implement adequate controls on physical access, communications, and software access to prevent Customers from reading, displaying, copying or transmitting the actual code or documentation of the Programs.
Hosted Solutions. Hosted solutions, including but not limited to hosted email and document-related applications, may require Client to accept the terms of a third party XXXX, which may contain service levels, warranties
Hosted Solutions 
AutoNDA by SimpleDocs

Related to Hosted Solutions

  • Hosted Services 3.1 The Provider hereby grants to the Customer a worldwide, non-exclusive licence to use the Hosted Services for the business purposes of the Customer in accordance with the Documentation during the Term. 3.2 The Provider shall create an Account for the Customer and shall provide to the Customer login details for that Account to enable the Customer to configure and administer the Hosted Services and enable registration of Customer End Users. 3.3 Except to the extent expressly permitted in this Agreement or required by law on a non- excludable basis, the licence granted by the Provider to the Customer under Clause 3.1 is subject to the following prohibitions: (a) the Customer must not sub-license its right to use the Hosted Services; (b) the Customer must not make any alteration to the Platform; and (c) the Customer must not conduct or request that any other person conduct any load testing or penetration testing on the Platform or Hosted Services without the prior written consent of the Provider. 3.5 The Customer shall use reasonable endeavours, including appropriate organisational and technical measures relating to Account access details, to ensure that no unauthorised person may gain access to the Hosted Services using an Account. 3.6 The parties acknowledge and agree that Schedule 2 (Availability SLA) shall govern the availability of the Hosted Services. 3.7 The Customer must ensure that all persons using the Hosted Services with the authority of the Customer or by means of an Account comply with the Terms Of Use. 3.8 The Customer must not use the Hosted Services in any way that causes, or may cause, damage to the Hosted Services or Platform or impairment of the availability or accessibility of the Hosted Services. 3.9 The Customer must not use the Hosted Services: (a) in any way that is unlawful, illegal, fraudulent or harmful; or (b) in connection with any unlawful, illegal, fraudulent or harmful purpose or activity. 3.10 For the avoidance of doubt, the Customer has no right to access the software code (including object code, intermediate code and source code) of the Platform, either during or after the Term. 3.11 The Provider may suspend the provision of the Hosted Services if any amount due to be paid by the Customer to AWS for the benefit of the Provider under this Agreement is overdue, and the Provider has given to the Customer at least 30 days' written notice, following the amount becoming overdue, of its intention to suspend the Hosted Services on this basis.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Customer Content As part of the Services provided under this Agreement, Customer Data will be stored and processed in the data center region specified in the applicable Ordering Document. Axway shall not access Customer Content except in response to support or technical issues where Customer provides Axway with prior Customer’s written authorization required to access such Customer Content. Axway is not responsible for unauthorized access, alteration, theft or destruction of Customer Content arising from Customer’s own or its authorized users’ actions or omissions in contravention of the Documentation. Customer’s ability to recover any lost data resulting from Axway’s misconduct is limited to restoration by Axway from the most recent back-up.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment. 5.2 If a D&E Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by D&E, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. D&E shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 D&E shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow D&E to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. 5.4 D&E shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from D&E Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, D&E shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow D&E to route information services traffic originated on its network to Verizon.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Programming Processor is not responsible for programming or reprogramming of fuel dispensers.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!