NETWORK RECOVERY Sample Clauses

NETWORK RECOVERY. Vendor will reroute the affected data communications circuits from the Data Center to the Recovery Centers. Upon [ * ], Vendor will be responsible for all network Disaster Recovery Services, including any costs associated with Vendor managed connectivity and support. ACI, in cooperation with Vendor, will develop a network recovery plan to be included in the Disaster Recovery Plan. The network recovery plan will use the strategy for redundancy in place at the time of a declared Disaster and will include recoverability only to the extent the Configuration includes the necessary network connectivity to ACI’s control units. Confidential Exhibit A-9 — Disaster Recovery and Business Continuity Services ACI WORLDWIDE, INC. HAS REQUESTED THAT THE PORTIONS OF THIS DOCUMENT DENOTED BY BOXES AND ASTERISKS BE ACCORDED CONFIDENTIAL TREATMENT PURSUANT TO RULE 24b-2 PROMULGATED UNDER THE SECURITIES EXCHANGE ACT OF 1934.
AutoNDA by SimpleDocs
NETWORK RECOVERY. SS&C has designed a multiple-carrier solution for data connectivity to the BRC. Network carriers provide diverse fiber connections between the WDC and the BRC. This network design allows for redundant connectivity to mirror and backup application data. SS&C accomplishes this connectivity by using high-speed channel extension and IP technology. SS&C does not encrypt data transferred within SS&C’s internal network.
NETWORK RECOVERY. IBM Local Entity will be responsible for all network disaster recovery services relating to the network components (including those services contracted with third parties) required to provide the Services, beyond Federal-Mogul Local Entity’s LAN connection to the IBM Controlled Router, including any costs associated with connectivity and support. IBM Local Entity will develop, for Federal-Mogul Local Entity’s comment and approval, a network recovery plan to be included in the DRP. *** MATERIAL OMITTED AND FILED SEPARATELY WITH THE SEC PURSUANT TO A REQUEST FOR CONFIDENTIAL TREATMENT 5 Exhibit O (Pro Forma) Schedule O-1: Recovery Time Objectives Recovery Time Objectives Services to be Restored *** *** *** *** *** *** *** MATERIAL OMITTED AND FILED SEPARATELY WITH THE SEC PURSUANT TO A REQUEST FOR CONFIDENTIAL TREATMENT 1 Exhibit O (Pro Forma) Schedule O-2: Key Critical Services (A) ***
NETWORK RECOVERY. 3.1. The Optical Network shall be recovered by LESSORS within: · eight (8) hours, when LESSORS Operations Center (“COP”) receive a notice from LESSEE monitoring area, valid for tails and non-redundancy stretches. · eight (8) hours, from the moment LESSORS COP receives a notice from LESSEE monitoring area, valid for networks with track redundancy.

Related to NETWORK RECOVERY

  • Disaster Recovery PFPC shall enter into and shall maintain in effect with appropriate parties one or more agreements making reasonable provisions for emergency use of electronic data processing equipment to the extent appropriate equipment is available. In the event of equipment failures, PFPC shall, at no additional expense to the Fund, take reasonable steps to minimize service interruptions. PFPC shall have no liability with respect to the loss of data or service interruptions caused by equipment failure, provided such loss or interruption is not caused by PFPC's own willful misfeasance, bad faith, gross negligence or reckless disregard of its duties or obligations under this Agreement.

  • Customer Relations A. Actively promote DCP Holding Company in all Marketing, Sales, Public Relations, and Community activity.

  • Customer Service As between Fig and Developer, Developer shall be solely responsible for providing and maintaining customer service and technical support in the Territory to Distributors and end users with respect to the Licensed Game (including, for the avoidance of doubt, any Distributors and end-users of Fig pursuant to Fig Sales (as defined below)). Such customer service and technical support shall be of a quality that is comparable to such customer service and technical support as Developer provides for its other “top-tier” titles. For the purposes of this Section, “customer service” means the resolution of issues pertaining to the Licensed Game in the following general categories: payment processing, order inquiries, replacements and refunds, and technical support.

  • Customer Services Provide services and systems dedicated to customer service, including billing, remittance, credit, collections, customer relations, call centers, energy conservation support and metering.

  • Disaster Recovery Plan Upon Tesla’s request, Supplier shall provide to Tesla reasonable information describing its disaster recovery plan that includes emergency back-up capacity, and appropriate record protection and recovery.

  • Call Center Services Answer telephone inquiries during mutually agreed upon hours each day on which the Fund is open for trading. In the event that the Fund plans to be open on a business day when the New York Stock Exchange is to be closed, the Fund shall provide the Transfer Agent with reasonable advance notice and the parties shall discuss the call center resources available for such day. The Transfer Agent shall answer and respond to inquiries from existing Shareholders, prospective Shareholders of the Fund and broker-dealers on behalf of such Shareholders in accordance with the instructions provided by the Fund to the Transfer Agent for purpose of fulfilling its duties under this Agreement, including, accepting transaction requests on behalf of the Fund.

  • Remittance Processing Services In order to provide a means of collection of the Receivables which will allow the Trustee to receive the proceeds of the Receivables and related security without AmeriCredit or its Affiliates having access to the funds, the parties hereto agree for the benefit of the Trustee that the processing services (the “Service(s)”) of Processor will be used for the collection and the deposit of remittances related to the Receivables and related security.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • CUSTOMER SERVICE FUNCTIONS The Servicer shall handle all Customer inquiries and other Customer service matters according to the same procedures it uses to service Customers with respect to its own charges.

  • Data Collection, Processing and Usage The Company collects, processes and uses the International Participant’s personal data, including the International Participant’s name, home address, email address, and telephone number, date of birth, social insurance number or other identification number, salary, citizenship, job title, any shares of Common Stock or directorships held in the Company, and details of all Equity Awards or any other equity compensation awards granted, canceled, exercised, vested, or outstanding in the International Participant’s favor, which the Company receives from the International Participant or the Employer. In granting the Equity Award under the Plan, the Company will collect the International Participant’s personal data for purposes of allocating shares of Common Stock and implementing, administering and managing the Plan. The Company’s legal basis for the collection, processing and usage of the International Participant’s personal data is the International Participant’s consent.

Time is Money Join Law Insider Premium to draft better contracts faster.