Independent Backup Sample Clauses

Independent Backup. Unless specifically otherwise agreed to in an applicable Order or Service Attachment, Client must maintain an independent backup of all files that are sent to either the cloud or a data backup service. A backup solution must be in place, with backup copies stored off-site. It is the Client’s responsibility to verify that backups are made regularly, as well as the integrity of the backups. Provider shall not be held liable in the event of data loss, backup software failure, backup selection, backup hardware failure, backup media failure, or backup system failure even in the event that Provider was tasked to perform the backups. Client will be solely responsible for all lost data.
AutoNDA by SimpleDocs
Independent Backup. Unless specifically otherwise agreed in to an applicable Order, Client must maintain an independent backup of all files that are sent to either the cloud or a data backup service. A backup solution must be in place, with backup copies stored off-site. It is the Client’s responsibility to verify that backups are made regularly, as well as the integrity of the backups. Provider shall not be held liable in the event of data loss, backup software failure, backup selection, backup hardware failure, backup media failure, or backup system failure even in the event that Provider was tasked to perform the backups. Client will be solely responsible for all lost data if it has not maintained an adequate independent backup. Provider is not responsible for criminal acts of third parties, including but not limited to intrusions or unauthorized access of any kind, hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting network security on your environment related to third-party criminal activity. Any costs or fees to rebuild or service machines are provided and sold separately by Provider. Anti-virus solution must be in place, updated, with valid update subscription. Provider is not responsible for any harm that may be cause by Client’s access to third party application programming interfaces or the execution or transmission of malicious code or similar occurrences, including without limitation, disabling devices, drop dead devices, time bombs, trap doors, Trojan horses, worms, viruses and similar mechanisms. Any costs or fees to rebuild or service machines are provided and sold separately by Provider. All Client virtual machine data shall belong to Client. However, Client agrees that all virtual machines and configurations of Client’s network shall belong to Provider as Provider’s Intellectual Property, and Provider will not transfer to Client any virtual machines or information regarding configurations. Client also agrees to keep information regarding Provider’s virtual machines and configurations confidential. In addition to its other confidentiality obligations under an applicable Service Attachment, Provider shall not use, edit or disclose to any party other than Client any Client Data (defined below), except as otherwise requested by Client, or required by court order or applicable law. For purposes of this provision, all data stored on the virtualized machines ass...
Independent Backup. Unless specifically otherwise agreed to in an applicable Quote, Customer must maintain an independent backup of all files that are sent to either the cloud or
Independent Backup. Unless specifically otherwise agreed to in an applicable Order or Service Attachment, Client must maintain an independent backup of all files that are sent to either the cloud or a data backup service. A backup solution must be in place, with backup copies stored off-site. It is the Client’s responsibility to verify that backups are made regularly, as well as the integrity of the backups. Provider shall not be held liable in the event of data loss, backup software failure, backup selection, backup hardware failure, backup media failure, or backup system failure even in the event that Provider was tasked to perform the backups. Client will be solely responsible for all lost data. Provider is not responsible for criminal acts of third parties, including but not limited to intrusions or unauthorized access of any kind, hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. CLIENT AGREES TO PAY XXXXXX OR HOLD PROVIDER HARMLESS FOR ANY ACTIVITY AFFECTING NETWORK SECURITY ON CLIENT’S ENVIRONMENT RELATED TO THIRD-PARTY CRIMINAL ACTIVITY, NETWORK SECURITY OR PRIVACY. Any costs or fees to rebuild or service machines will be billed at provider’s then prevailing hourly rates.
Independent Backup. Unless specifically otherwise agreed in to an applicable Service Attachment, Client must maintain an independent backup of all files that are sent to either the cloud or a data backup service. A backup solution must be in place, with backup copies stored off-site. It is the Client’s responsibility to verify that backups are made regularly, as well as the integrity of the backups. Provider shall not be held liable in the event of data loss, backup software failure, backup selection, backup hardware failure, backup media failure, or backup system failure even in the event that Provider was tasked to perform the backups. Client will be solely responsible for all lost data if it has not maintained an adequate independent backup. Provider is not responsible for criminal acts of third parties, including but not limited to intrusions or unauthorized access of any kind, hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider
Independent Backup. Unless specifically otherwise agreed to in an applicable Service Attachment, Client must maintain an independent backup of all files that are sent to either the cloud or data backup service. A backup solution must be in place, with backup copies stored off-site. It is Client's responsibility to verify that the backups are made regularly, as well as the integrity of the backups. Provider shall not be held liable in the event of data loss, backup software failure, backup selection, backup hardware failure, backup media failure, or backup system failure even in the event that Provider was tasked to perform the backups. Client will be solely responsible for all lost data. Provider is not responsible for criminal acts of third parties, including but not limited to intrusions or unauthorized access of any kind, hackers, phishers, crypto lockers, and any network environment subject to xxxxxx. In the event of a total loss, Client agrees to pay the xxxxxx or hold Provider harmless for any activity affecting network security in Client’s environment related to third-party criminal activity. Any costs or fees to rebuild or service machines will trigger a billable project subject to a separate Order or Project Service Attachment or Statement of Work, which will be billed at Provider's then-current rates. Antivirus solutions must be in place, routinely updated, and maintain a valid subscription. Provider is not responsible for any harm or injury that may be caused by Client’s access to third-party application programming interfaces (API) or the execution and/or transmission of malicious code or similar occurrences, including without limitation disabling devices, drop-dead-devices, time bombs, trap doors, trojan horses, worms, viruses, and similar mechanisms. Any costs or fees to rebuild or service machines will trigger a billable project subject to a separate Order or Project Service Attachment or Statement of Work, which will be billed at Provider's then-current rates.
Independent Backup. Unless specifically otherwise agreed to in an applicable Order or Service Attachment, Client must maintain an independent backup of all files that are sent to either the cloud or a data backup service. A backup solution must be in place, with backup copies stored off-site. It is the Client’s responsibility to verify that backups are made regularly, as well as the integrity of the backups. Provider shall not be held liable in the event of data loss, backup software failure, backup selection, backup hardware failure, backup media failure, or backup system failure even in the event that Provider was tasked to perform additional backups. Client will be solely responsible for all lost data. but not reported preceding the date onboarding is complete and the RMM is fully deployed.
AutoNDA by SimpleDocs

Related to Independent Backup

  • Independent Study A sabbatical leave may be granted for a plan of independent study, research, writing, and/or travel equivalent in time and rigor to a sabbatical for formal study. A detailed, specific plan must be submitted by the applicant and approved by the Salary and Leaves Committee as likely to improve the applicant’s teaching effectiveness, strengthen the College’s academic program, or otherwise bring a clear benefit to students. In addition, sabbaticals for independent study must generate tangible products of use to students.

  • Independent Evaluation Buyer is experienced and knowledgeable in the oil and gas business. Buyer has been advised by and has relied solely on its own expertise and legal, tax, accounting, marketing, land, engineering, environmental and other professional counsel concerning this transaction, the Subject Property and value thereof.

  • Independent Testing Owner shall furnish independent tests, inspections and reports required by law, the Contract Documents or deemed appropriate by the Owner, such as structural, mechanical, and chemical tests, tests for air and water pollution, and tests for hazardous materials to be conducted by consultants retained by the Owner.

  • Independent Decision The Investor is not relying on the Issuer or on any legal or other opinion in the materials reviewed by the Investor with respect to the financial or tax considerations of the Investor relating to its investment in the Shares. The Investor has relied solely on the representations and warranties, covenants and agreements of the Issuer in this Agreement (including the exhibits and schedules hereto) and on its examination and independent investigation in making its decision to acquire the Shares.

  • Independent Status The employees, volunteers, or agents of each party who are engaged in the performance of this Agreement will continue to be employees, volunteers, or agents of that party and will not for any purpose be employees, volunteers, or agents of the other party.

  • Independent Review Contractor shall provide the Secretary of ADS/CIO an independent expert review of any Agency recommendation for any information technology activity when its total cost is $1,000,000.00 or greater or when CIO requires one. The State has identified two sub-categories for Independent Reviews, Standard and Complex. The State will identify in the SOW RFP the sub-category they are seeking. State shall not consider bids greater than the maximum value indicated below for this category. Standard Independent Review $25,000 Maximum Complex Independent Review $50,000 Maximum Per Vermont statute 3 V.S.A. 2222, The Secretary of Administration shall obtain independent expert review of any recommendation for any information technology initiated after July 1, 1996, as information technology activity is defined by subdivision (a) (10), when its total cost is $1,000,000 or greater or when required by the State Chief Information Officer. Documentation of this independent review shall be included when plans are submitted for review pursuant to subdivisions (a)(9) and (10) of this section. The independent review shall include: • An acquisition cost assessment • A technology architecture review • An implementation plan assessment • A cost analysis and model for benefit analysis • A procurement negotiation advisory services contract • An impact analysis on net operating costs for the agency carrying out the activity In addition, from time to time special reviews of the advisability and feasibility of certain types of IT strategies may be required. Following are Requirements and Capabilities for this Service: • Identify acquisition and lifecycle costs; • Assess wide area network (WAN) and/or local area network (LAN) impact; • Assess risks and/or review technical risk assessments of an IT project including security, data classification(s), subsystem designs, architectures, and computer systems in terms of their impact on costs, benefits, schedule and technical performance; • Assess, evaluate and critically review implementation plans, e.g.: • Adequacy of support for conversion and implementation activities • Adequacy of department and partner staff to provide Project Management • Adequacy of planned testing procedures • Acceptance/readiness of staff • Schedule soundness • Adequacy of training pre and post project • Assess proposed technical architecture to validate conformance to the State’s “strategic direction.” • Insure system use toolsets and strategies are consistent with State Chief Information Officer (CIO) policies, including security and digital records management; • Assess the architecture of the proposed hardware and software with regard to security and systems integration with other applications within the Department, and within the Agency, and existing or planned Enterprise Applications; • Perform cost and schedule risk assessments to support various alternatives to meet mission need, recommend alternative courses of action when one or more interdependent segment(s) or phase(s) experience a delay, and recommend opportunities for new technology insertions; • Assess the architecture of the proposed hardware and software with regard to the state of the art in this technology. • Assess a project’s backup/recovery strategy and the project’s disaster recovery plans for adequacy and conformance to State policy. • Evaluate the ability of a proposed solution to meet the needs for which the solution has been proposed, define the ability of the operational and user staff to integrate this solution into their work.

  • Independent Audit The Grantee shall submit, in a format specified by the department, the independent financial compliance audit prepared by an independent Certified Public Accountant for the previous fiscal year. The audit shall follow the General Grant Requirements of Sections VIII (F) and (G) and be submitted no later than March 1 of the current fiscal year.

  • Independent Auditors The Company shall, until at least the Termination Date, maintain as its independent auditors an accounting firm authorized to practice before the SEC.

  • Independent Manager Notwithstanding anything to the contrary in the certificate of formation or limited liability company agreement of the Depositor, the Depositor shall ensure that at least one manager of the Depositor shall be an Independent Manager.

  • Independent Auditor If: (a) the Provider is the Distributor and, acting reasonably, gives notice that the Records contain information about other industry participants that cannot reasonably be severed from the information relating to the Trader or that the information is commercially sensitive; or (b) the provider is the Trader and, acting reasonably, gives notice that the Records contain information about other industry participants that cannot reasonably be severed from information relating to the Distributor or that the information is commercially sensitive, then the Distributor or the Trader, as appropriate, will permit an independent auditor (the “Auditor”) appointed by the other party to review the Records and the other party will not itself directly review any of the Records. The Distributor or the Trader, as appropriate, will not unreasonably object to the Auditor appointed by the other party. In the event that the Distributor or the Trader, as appropriate, reasonably objects to the identity of the Auditor, the parties will request the President of the New Zealand Law Society (or a nominee) to appoint a person to act as the Auditor. The party that is permitted by this clause 31.5 to appoint an Auditor will pay the Auditor’s costs, unless the Auditor discovers a material inaccuracy in the Records in which case the other party will pay the Auditor’s costs. The terms of appointment of the Auditor will require the Auditor to keep the Records confidential.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!