Collaboration Management Promptly after the Effective Date, each Party will appoint a person who will oversee day-to-day contact between the Parties for all matters related to the management of the Collaboration Activities in between meetings of the JSC and will have such other responsibilities as the Parties may agree in writing after the Effective Date. One person will be designated by Merck (the “Merck Program Director”) and one person will be designated by Moderna (the “Moderna Program Director,”) together will be the “Program Directors”. Each Party may replace its Program Director at any time by notice in writing to the other Party. Any Program Director may designate a substitute to temporarily perform the functions of that Program Director by written notice to the other Party. The initial Program Directors will be: For Moderna: [***] For Merck: [***]
Interactive Data The interactive data in eXtensible Business Reporting Language included as an exhibit to the Registration Statement or incorporated by reference in the Registration Statement fairly presents the information called for in all material respects and has been prepared in accordance with the Commission’s rules and guidelines applicable thereto.
Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity
Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:
Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.
Information Systems Acquisition Development and Maintenance Security of System Files. To protect City Information Processing Systems and system files containing information, Service Provider will ensure that access to source code is restricted to authorized users whose specific job function necessitates such access.
Technology Access Fee After the Effective Date, within [***] days after receipt of the corresponding invoice from Mersana, Merck will pay to Mersana, a one-time, non-refundable, non-creditable, upfront fee of Twelve Million Dollars ($12,000,000.00) (the [***] Portions of this exhibit have been redacted pursuant to a confidential treatment request. An unredacted version of this exhibit has been filed separately with the Commission. “Technology Access Fee”). Payment of the Technology Access Fee shall be subject to any withholding Tax obligations set forth in Section 6.9.1.