Medium Priority Problems Sample Clauses

Medium Priority Problems. Both Parties shall address Medium Priority Errors as Severity 1 Errors in accordance with Exhibit B-2. CNN may also contact the First Level Escalation Contact if the target response times set forth in Exhibit B-2 are not met. If a Medium Priority Error is not Fixed or a Workaround is not implemented within twelve (12) hours after contacting the First Level Escalation Contact, the Second Level Escalation Contact may be contacted. If the Medium Priority Error is not Fixed or a Workaround is not implemented within twelve (12) hours after contacting the Second Level Escalation Contact, then the Third Level Escalation Contact may be contacted. If either Party’s Escalation Contact has been contacted by the other Party, they may contact the corresponding Escalation Contact.
AutoNDA by SimpleDocs

Related to Medium Priority Problems

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Lien Sharing and Priority Confirmation Each Holder, by accepting a Note, and the Trustee hereby agrees that:

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Secured Party Control Bank, Secured Party, Servicer and Company each agree that Bank will comply with instructions given to Bank by Secured Party directing disposition of funds in the Collateral Accounts (“Disposition Instructions”) without further consent by Company or Servicer. Except as otherwise required by law, Bank will not agree with any third party to comply with instructions for disposition of funds in the Collateral Accounts originated by such third party.

  • Product Claims You and the end-user must acknowledge that You, not Apple, are responsible for addressing any claims of the end-user or any third party relating to the Licensed Application or the end-user’s possession and/or use of that Licensed Application, including, but not limited to: (i) product liability claims; (ii) any claim that the Licensed Application fails to conform to any applicable legal or regulatory requirement; and (iii) claims arising under consumer protection or similar legislation. The XXXX may not limit Your liability to the end-user beyond what is permitted by applicable law.

  • Priority of Documents If any of the documents referenced in Section 2(c) are inconsistent, this Agreement shall prevail over the Exhibits, the Schedules and additional incorporated documents.

  • Site Visits and Inspections; Regulatory Examinations During the term of this Agreement, authorized representatives of the Fund may conduct periodic site visits of the Transfer Agent’s facilities and inspect the Transfer Agent’s records and procedures solely as they pertain to the Transfer Agent’s services for the Fund under or pursuant to this Agreement. Such inspections shall be conducted at the Fund’s expense (which shall include costs related to providing materials, copying, faxing, retrieving stored materials, and similar expenses) and shall occur during the Transfer Agent’s regular business hours and, except as otherwise agreed to by the parties, no more frequently than twice a year. In connection with such site visit and/or inspection, the Fund shall not attempt to access, nor will it review, the records of any other clients of the Transfer Agent and the Fund shall conduct the visit/inspection in a manner that will not interfere with the Transfer Agent’s normal and customary conduct of its business activities, including the provision of services to the Fund and to other clients. The Transfer Agent shall have the right to immediately require the removal of any Fund representatives from its premises in the event that their actions, in the reasonable opinion of the Transfer Agent, jeopardize the information security of its systems and/or other client data or otherwise are disruptive to the business of the Transfer Agent. The Transfer Agent may require any persons seeking access to its facilities to provide reasonable evidence of their authority. The Transfer Agent may also reasonably require any of the Fund’s representatives to execute a confidentiality agreement before granting such individuals access to its facilities. The Transfer Agent will also provide reasonable access to the Fund’s governmental regulators, at the Fund’s expense, solely to (i) the Fund’s records held by the Transfer Agent and (ii) the procedures of the Transfer Agent directly related to its provision of services to the Fund under the Agreement.

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Appropriate Documentation The Company will have received, in a form and substance reasonably satisfactory to Company, dated the Closing Date, all certificates and other documents, instruments and writings to evidence the fulfillment of the conditions set forth in this Article 6 as the Company may reasonably request.

Time is Money Join Law Insider Premium to draft better contracts faster.