We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Hosting Requirements Sample Clauses

Hosting Requirements. 1. The Licensor or its subcontractor shall supply all hosting equipment (hardware and software) required for the cloud services and performance of the software and services set forth in the Quote and Statement of Work. 2. The Licensor shall provide secure access to applicable levels of users via the internet. 3. The Licensor shall use commercially reasonable resources and efforts to maintain adequate internet connection bandwidth and server capacity. 4. The Licensor or its subcontractors shall maintain all components of the hosted solution with commercially reasonable support and replace as necessary to maintain compliance. 5. The Licensor shall monitor, prevent and deter unauthorized system access. The Licensor shall use all commercially reasonable methods to confirm suspected breaches. In the event of any impermissible disclosure unauthorized loss or destruction of Confidential Information, the receiving Party must immediately notify the disclosing Party and take all reasonable steps to mitigate any potential harm or further disclosure of such Confidential Information. In addition, pertaining to the unauthorized access, use, release, or disclosure of data, the Licensor shall comply with state and federal data breach notification statutes and regulations, and shall report security incidents to the Commonwealth within one (1) hour of when the Licensor has reasonable confirmation of such unauthorized access, use, release, or disclosure of data. 6. The Licensor or the Licensor’s subcontractor shall allow the Commonwealth or its delegate, at times chosen by the Commonwealth, and with at least three (3) business days’ notice, to review the hosted system’s data center locations and security architecture. 7. The Licensor’s employees or subcontractors, who are directly responsible for day- to-day monitoring and maintenance of the hosted system, shall have industry standard certifications applicable to the environment and system architecture used. 8. The Licensor or the Licensor’s subcontractor shall locate servers in a climate- controlled environment. The Licensor or the Licensor’s contractor shall house all servers and equipment in an operational environment that meets industry standards including climate control, fire and security hazard detection, electrical needs, and physical security. 9. The Licensor shall examine applicable system and error logs daily to minimize and predict system problems and initiate appropriate action. 10. The Licensor shall completely...
Hosting Requirements a. Where Lattice handles Customer Data, servers shall be protected from unauthorized access with appropriate physical security mechanisms including, but not limited to, badge access control, secure perimeter, and enforced user provisioning controls (i.e. appropriate authorization of new accounts, timely account terminations and frequent user account reviews). These physical security mechanisms are provided by data center partners such as, but not limited to, AWS, Salesforce and Google. All cloud-hosted systems shall be scanned, where applicable and where approved by the cloud service provider. b. Cloud Environment Data Segregation: Lattice will virtually segregate all Customer Data in accordance with its established procedures. The Customer instance of Service may be on servers used by other non-Customer instances.
Hosting Requirements. Supplier will provide and maintain all facilities for hosting the ASP Solution, including: physical premises, server(s), database server(s), firewall(s), Internet connectivity and any other facilities required to support the Order Gateway and Order Manager. Supplier shall provide sufficient hardware, software and equipment to meet applicable service levels defined in an applicable Order for the ASP Solution.
Hosting Requirements a. Where Gainsight handles Client Data, servers shall be protected from unauthorized access with appropriate physical security mechanisms including, but not limited to, badge access control, secure perimeter, and enforced user provisioning controls (i.e. appropriate authorization of new accounts, timely account terminations and frequent user account reviews). These physical security mechanisms are provided by data center partners such as, but not limited to, AWS, Salesforce and Google. b. Cloud environment Data Segregation: Gainsight will virtually segregate all Client Data in accordance with its established procedures. The Client instance of Service may be on servers used by other non- Client instances.
Hosting Requirements. 1. The Selected Offeror or its subcontractor shall supply all hosting equipment (hardware and software) required for the cloud services and performance of the software and services set forth in the Quote and Statement of Work. 2. The Selected Offeror shall provide secure access to applicable levels of users via theinternet. 3. The Selected Offeror shall use commercially reasonable resources and efforts to maintain adequate internet connection bandwidth and server capacity. 4. The Selected Offeror or its subcontractors shall maintain all hosting equipment (hardware and software) and replace as necessary to maintain compliance with the Service Level Agreements.
Hosting Requirements. Hosting and domain, required for 3 years
Hosting Requirements. 1. The Licensor or its subcontractor shall supply all hosting equipment (hardware and software) required for the cloud services and performance of the software and services set forth in the Quote and Statement of Work. 2. The Licensor shall provide secure access to applicable levels of users via the internet. 3. The Licensor shall use commercially reasonable resources and efforts to maintain adequate internet connection bandwidth and server capacity. 4. The Licensor or its subcontractors shall maintain all hosting equipment (hardware and software) and replace as necessary to maintain compliance with the Service Level Agreements. 5. The Licensor shall monitor, prevent and deter unauthorized system access within a commercially reasonable framework. In the event of any impermissible disclosure unauthorized loss or destruction of Confidential Information, the receiving Party must immediately, but in no more than twenty-four (24) hours, notify the disclosing Party and take all reasonable steps to mitigate any potential harm or further disclosure of such Confidential Information. In addition, pertaining to the unauthorized access, use, release, or disclosure of data, the Licensor shall comply with state and federal data breach notification statutes and regulations. 6. The Licensor or the Licensor’s subcontractor shall allow the Commonwealth or its delegate within at least Thirty (30) days’ notice, to review the hosted system’s data center locations and security architecture, to occur no more than once every twelve
Hosting Requirements. 1. The Contractor and its subcontractor shall supply all hosting equipment (hardware and software) required for the cloud services and performance of the software and services set forth in the Contract. 2. The Contractor shall provide secure access to applicable levels of users via the internet. 3. The Contractor shall use commercially reasonable resources and efforts to maintain adequate internet connection bandwidth and server capacity 4. The Contractor and its subcontractors shall maintain all hosting equipment (hardware and software) required for cloud services and performance of software and services as set forth in the Contract and as required to maintain compliance with the Performance Requirements. 5. The Contractor shall monitor, prevent and deter unauthorized system access. Any and all known attempts must be reported to the Commonwealth within 48 hours. Attempts do not include pings, broadcast attacks on firewalls, port scans, or denials of service (“Alerts”) or any combination of Alerts unless such Alerts demonstrate a pattern of improper attempts or are targeted Alerts to access the system or if the Alerts exceed more than 20% of the normal volume of such Alerts. In the event of any impermissible disclosure, unauthorized loss or destruction of Confidential Information, the receiving Party must immediately notify the disclosing Party and take all reasonable steps to mitigate any potential harm or further disclosure of such Confidential Information. In addition, pertaining to the unauthorized access, use, release, or disclosure of data, the Contractor shall comply with state and federal data breach notification statutes and regulations, and shall report security incidents to the Commonwealth within one hour of when the Contractor has reasonable confirmation of such unauthorized access, use, release, or disclosure of data. 6. The Contractor and the Contractor’s subcontractor shall allow the Commonwealth or its delegate, at times chosen by the Commonwealth, and within at least three business days’ notice and in accordance with the cloud service provider’s pre- existing policies and procedures, to review the hosted system’s data center locations and security architecture. 7. The Contractor’s employees and subcontractors, who are directly responsible for day-to-day monitoring and maintenance of the hosted system, shall have industry standard certifications applicable to the environment and system architecture used. 8. The Contractor and the Contracto...
Hosting Requirements. EA will host the RMCF Marketplace with (i) uptime, (ii) response time, (iii) availability, and (iv) performance of its customer-facing services, (such as credit card processing times, customer inquiry response and resolution times) commensurate in all material respects with EA’s Edible Arrangements marketplace.
Hosting Requirements