High Risk Use Npcap is not designed, manufactured, or intended for use in hazardous environments requiring fail-safe performance where the failure of the software could lead directly to death, personal injury, or significant physical or environmental damage (“High Risk Activities”). Use of Npcap in High Risk Activities is not authorized.
First Source Hiring Program Contractor must comply with all of the provisions of the First Source Hiring Program, Chapter 83 of the San Francisco Administrative Code, that apply to this Agreement, and Contractor is subject to the enforcement and penalty provisions in Chapter 83.
Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.
Post-Award Small Business Program Re Representation If applicable, The Contractor shall report timely and accurately their small business program re-representation and update XXX.xxx.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.
High Risk Activities 1. The Software is not fault-tolerant and is not designed, manufactured or intended for use or resale as on-line control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines, or weapons systems, in which the failure of the Software could lead directly to death, personal injury, or severe physical or environmental damage ("High Risk Activities"). Syncro and its suppliers specifically disclaim any express or implied warranty of fitness for High Risk Activities.
Sites Sites shall mean the locations set forth in the Contract Documentation.
Develop programs 1) The Employer will develop and implement health promotion and health education programs, subject to the availability of resources. Each Appointing Authority will develop a health promotion and health education program consistent with the Minnesota Management & Budget policy. Upon request of any exclusive representative in an agency, the Appointing Authority shall jointly meet and confer with the exclusive representative(s) and may include other interested exclusive representatives. Agenda items shall include but are not limited to smoking cessation, weight loss, stress management, health education/self-care, and education on related benefits provided through the health plan administrators serving state employees.
Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.