Hosting Requirements Sample Clauses

Hosting Requirements. 1. The Licensor or its subcontractor shall supply all hosting equipment (hardware and software) required for the cloud services and performance of the software and services set forth in the Quote and Statement of Work.
AutoNDA by SimpleDocs
Hosting Requirements a. Where Lattice handles Customer Data, servers shall be protected from unauthorized access with appropriate physical security mechanisms including, but not limited to, badge access control, secure perimeter, and enforced user provisioning controls (i.e. appropriate authorization of new accounts, timely account terminations and frequent user account reviews). These physical security mechanisms are provided by data center partners such as, but not limited to, AWS, Salesforce and Google. All cloud-hosted systems shall be scanned, where applicable and where approved by the cloud service provider.
Hosting Requirements. Supplier will provide and maintain all facilities for hosting the ASP Solution, including: physical premises, server(s), database server(s), firewall(s), Internet connectivity and any other facilities required to support the Order Gateway and Order Manager. Supplier shall provide sufficient hardware, software and equipment to meet applicable service levels defined in an applicable Order for the ASP Solution.
Hosting Requirements. The Licensor or its subcontractor shall supply all hosting equipment (hardware and software) required for the cloud services and performance of the software and services set forth in the Quote and Statement of Work. The Licensor shall provide secure access to applicable levels of users via the internet. The Licensor shall use commercially reasonable resources and efforts to maintain adequate internet connection bandwidth and server capacity. The Licensor or its subcontractors shall maintain all hosting equipment (hardware and software) and replace as necessary to maintain compliance with the Service Level Agreements The Licensor shall monitor, prevent and deter unauthorized system access. Any and all known attempts must be reported to the Commonwealth within two (2) business days. In the event of any impermissible disclosure unauthorized loss or destruction of Confidential Information, the receiving Party must immediately notify the disclosing Party and take all reasonable steps to mitigate any potential harm or further disclosure of such Confidential Information. In addition, pertaining to the unauthorized access, use, release, or disclosure of data, the Licensor shall comply with state and federal data breach notification statutes and regulations, and shall report security incidents to the Commonwealth within one (1) hour of when the Licensor has reasonable confirmation of such unauthorized access, use, release, or disclosure of data. The Licensor or the Licensor’s subcontractor shall allow the Commonwealth or its delegate, at times chosen by the Commonwealth, and within at least three (3) business days’ notice, to review the hosted system’s data center locations and security architecture. The Licensor’s employees or subcontractors, who are directly responsible for day-to-day monitoring and maintenance of the hosted system, shall have industry standard certifications applicable to the environment and system architecture used. The Licensor or the Licensor’s subcontractor shall locate servers in a climate-controlled environment. The Licensor or the Licensor’s contractor shall house all servers and equipment in an operational environment that meets industry standards including climate control, fire and security hazard detection, electrical needs, and physical security. The Licensor shall examine applicable system and error logs daily to minimize and predict system problems and initiate appropriate action. The Licensor shall completely test and apply patches...
Hosting Requirements. Hosting and domain, required for 3 years • Minimum server requirements: Windows Server 2012 R2 or later, IIS 8.5 or later, MS SQL Server 2014 or later • Extension of the domain name xxxxxxxxx-xx.xxx for 3 years • SSL Certificate for website and CMS • Publication of mobile applications in the Play Store and Apple Store is required for 3 years. Responsibilities: Establish effective working relationship with LABYRINTH staff and partners Reporting:
Hosting Requirements a. Where Ditat handles Client Data, servers shall be protected from unauthorized access with appropriate physical security mechanisms including, but not limited to, badge access control, secure perimeter, and enforced user provisioning controls (i.e. appropriate authorization of new accounts, timely account terminations and frequent user account reviews). These physical security mechanisms are provided by data center partners such as, but not limited to, AWS, Salesforce and Google.
Hosting Requirements. EA will host the RMCF Marketplace with (i) uptime, (ii) response time, (iii) availability, and (iv) performance of its customer-facing services, (such as credit card processing times, customer inquiry response and resolution times) commensurate in all material respects with EA’s Edible Arrangements marketplace.
AutoNDA by SimpleDocs
Hosting Requirements a. Where Gainsight handles Client Data, servers shall be protected from unauthorized access with appropriate physical security mechanisms including, but not limited to, badge access control, secure perimeter, and enforced user provisioning controls (i.e. appropriate authorization of new accounts, timely account terminations and frequent user account reviews). These physical security mechanisms are provided by data center partners such as, but not limited to, AWS, Salesforce and Google.
Hosting Requirements 

Related to Hosting Requirements

  • Listing Requirements The Company shall not be obligated to deliver any certificates representing any shares until all applicable requirements imposed by federal and state securities laws and by any stock exchanges upon which the shares may be listed have been fully met.

  • Reporting Requirements The Company, during the period when the Prospectus is required to be delivered under the 1933 Act or the 1934 Act, will file all documents required to be filed with the Commission pursuant to the 1934 Act within the time periods required by the 1934 Act and the 1934 Act Regulations.

  • Vesting Requirements The vesting of this Award (other than pursuant to accelerated vesting in certain circumstances as provided in Section 3 below or vesting pursuant to Section 6 below) shall be subject to the satisfaction of the conditions set forth in each of subsections A and B, as applicable, and, in each case, subsection C of this Section 2:

  • Filing Requirements Escrow securities will not be released under this Part until the Issuer does the following:

  • Reporting Requirement (1) In the event the Contractor identifies covered telecommunications equipment or services used as a substantial or essential component of any system, or as critical technology as part of any system, during contract performance, or the Contractor is notified of such by a subcontractor at any tier or by any other source, the Contractor shall report the information in paragraph (d)(2) of this clause to the Contracting Officer, unless elsewhere in this contract are established procedures for reporting the information; in the case of the Department of Defense, the Contractor shall report to the website at xxxxx://xxxxxx.xxx.xxx. For indefinite delivery contracts, the Contractor shall report to the Contracting Officer for the indefinite delivery contract and the Contracting Officer(s) for any affected order or, in the case of the Department of Defense, identify both the indefinite delivery contract and any affected orders in the report provided at xxxxx://xxxxxx.xxx.xxx.

Time is Money Join Law Insider Premium to draft better contracts faster.