Incident Category and Priority Response and Resolution Targets Sample Clauses

Incident Category and Priority Response and Resolution Targets. A. Company shall comply with the priority levels provided below when Incidents are reported by Authority. These levels, as determined by Authority, are measured according to the business impacts of each problem. Software Support activity prioritization, response and resolution expectations are based on impact and urgency. Company must provide Authority with a single point of contact for the Company Service Desk, as well as an updated escalation matrix which details contact information. The escalation must be maintained, and changes sent to the Authority Vice President of Information Technology Services. This information should include physical address, phone, email, any other available means of contact type. Category Description High The damage caused by the Incident increases rapidly. Work that cannot be completed by staff is highly time sensitive. A minor Incident can be prevented from becoming a Major Incident by acting immediately. Customers are not able to be processed. A large number of customers are affected and/or acutely disadvantaged in some way. The financial impact of the Incident is likely to exceed $10,000. The damage to the reputation of the Airport is likely to be high. Medium The damage caused by the incident increases considerably over time. A moderate number of staff are affected and/or not able to do their job properly. A moderate number of customers are affected and/or inconvenienced in some way. The financial impact of the Incident is likely to exceed $1,000 but will not be more than $10,000. The damage to the reputation of the Airport is likely to be moderate. Low A minimal number of staff are affected and/or able to deliver an acceptable service but this requires extra effort. A minimal number of customers are affected and/or inconvenienced but not in a significant way. The financial impact of the Incident is likely to be less than $1,000. The damage to the reputation of the Airport is likely to be minimal.
AutoNDA by SimpleDocs

Related to Incident Category and Priority Response and Resolution Targets

  • Recognition of the U.S. Special Resolution Regimes (i) In the event that any Underwriter that is a Covered Entity becomes subject to a proceeding under a U.S. Special Resolution Regime, the transfer from such Underwriter of this Agreement, and any interest and obligation in or under this Agreement, will be effective to the same extent as the transfer would be effective under the U.S. Special Resolution Regime if this Agreement, and any such interest and obligation, were governed by the laws of the United States or a state of the United States. (ii) In the event that any Underwriter that is a Covered Entity or a BHC Act Affiliate of such Underwriter becomes subject to a proceeding under a U.S. Special Resolution Regime, Default Rights under this Agreement that may be exercised against such Underwriter are permitted to be exercised to no greater extent than such Default Rights could be exercised under the U.S. Special Resolution Regime if this Agreement were governed by the laws of the United States or a state of the United States. As used in this Section 16(e):

  • Recognition of U.S. Special Resolution Regimes (a) In the event a Covered Party becomes subject to a proceeding under a U.S. Special Resolution Regime, the transfer of this Agreement (and any interest and obligation in or under, and any property securing, this Agreement) from such Covered Party will be effective to the same extent as the transfer would be effective under the U.S. Special Resolution Regime if this Agreement (and any interest and obligation in or under, and any property securing, this Agreement) were governed by the laws of the United States of America or a State of the United States of America. (b) In the event that a Covered Party or any BHC Affiliate of such Covered Party becomes subject to a proceeding under a U.S. Special Resolution Regime, any Default Right under this Agreement that may be exercised against such Covered Party is permitted to be exercised to no greater extent than such Default Right could be exercised under the U.S. Special Resolution Regime if this Agreement were governed by the laws of the United States of America or a State of the United States of America.

  • UDP DNS resolution RTT Refers to the RTT of the sequence of two packets, the UDP DNS query and the corresponding UDP DNS response. If the RTT is 5 times greater than the time specified in the relevant SLR, the RTT will be considered undefined.

  • Patent Filing Responsibilities and Costs 1. The invention and patent rights herein apply to any patent application or patents covering an invention made under this Agreement. Each Party is responsible for its own costs of obtaining and maintaining patents covering sole inventions of its employees. The Parties may agree otherwise, upon the reporting of any invention (sole or joint) or in any license granted. 2. Partner shall include the following in patent applications for an invention made jointly between NASA employees, its Related Entity employees and Partner employees: The invention described herein may be manufactured and used by or for the U.S. Government for U.S. Government purposes without the payment of royalties thereon or therefore.

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Customer Responsibilities Notwithstanding the above, Customer agrees that except as provided by this DPA, Customer is responsible for its secure use of the Services, including securing its account authentication credentials, protecting the security of Customer Data when in transit to and from the Services and taking any appropriate steps to securely encrypt or backup any Customer Data uploaded to the Services.

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? Yes

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Specific Responsibilities Without limiting the responsibilities of the Manager, the Manager will: 1. Maintain office facilities (which may be in the offices of the Manager or a corporate affiliate but shall be in such location as the Trust reasonably determines). 2. Furnish statistical and research data, clerical services and stationery and office supplies. 3. Compile data for, prepare for execution by the Fund and file all the Fund’s federal and state tax returns and required tax filings other than those required by this Agreement to be made by the Fund’s custodian and transfer agent. 4. Prepare compliance filings pursuant to state securities laws with the advice of the Trust’s counsel. 5. Prepare the Trust’s Annual and Semi-Annual Reports to Shareholders and amendments to its Registration Statements (on Form N-1A or any replacement therefor). 6. Compile data for, prepare and file timely Notices to the SEC required pursuant to Rule 24f-2 under the 1940 Act. 7. Determine the daily pricing of the portfolio securities and computation of the net asset value and the net income of Fund in accordance with the Prospectus, resolutions of the Trust’s Board of Trustees, and the procedures set forth in EXHIBIT A: NET ASSET VALUE CALCULATIONS. 8. Keep and maintain the financial accounts and records of the Fund and provide the Trust with certain reports, as needed or requested by the Fund. 9. Provide officers for the Trust as requested by the Trust’s Board of Trustees. 10. Perform fund accounting services for the Fund as set forth in EXHIBIT B: FUND ACCOUNTING FUNCTIONS. 11. Generally assist in all aspects of the operations of the Fund.

  • User Responsibilities i. Users are required to follow good security practices in the selection and use of passwords; ii. Users shall ensure that unattended equipment is protected; and iii. Users shall adopt a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!