No Trojan Horse or Others Similar Routines Sample Clauses

No Trojan Horse or Others Similar Routines. CMI warrants that SEVOCITY® does not contain any virus, “Trojan horse,” “worm,” or other software routines designed to permit unauthorized access, to disable, erase, or otherwise harm software, hardware or data, or to perform any other similar actions.
AutoNDA by SimpleDocs
No Trojan Horse or Others Similar Routines. REGION 7 ESC warrants that DMAC does not contain any virus, “Trojan horse,” “worm,” or other software routines designed to permit unauthorized access, to disable, erase, or otherwise harm software, hardware or data, or to perform any other similar actions.
No Trojan Horse or Others Similar Routines. CMI warrants that SEVOCITY® does not contain any virus, “Trojan horse,” “worm,” or other software routines designed to permit unauthorized access, to disable, erase, or otherwise harm software, hardware or data, or to perform any other similar actions. SEVOCITY® Services Agreement/7040.29 (June 2021) 7.4 Availability and Performance. Uptime for SEVOCITY® shall be seven (7) days a week, twenty-four (24) hours a day (“S cheduled Uptime”), provided that upon notice to the Licensee at least seventy-two (72) hours in advance, CMI may provide for scheduled downtime for maintenance (“Scheduled Downtime”). CMI warrants to Licensee for the term of the Agreement that SEVOCITY® shall be available for use by Licensee as set forth in the Agreement in substantially its full core functionality for a minimum of 99.5% of the Scheduled Uptime on a monthly basis, excluding Scheduled Downtime (“P erformance Criteria”). If the breach of warranty or failure results in Uptime being less than the specified Performance Criteria for two (2) consecutive months or for four (4) months in any consecutive twelve (12) month period, then Licensee’s sole remedy is as follows: (a) if failure to meet the Performance Criteria is caused solely by events within CMI’s commercially reasonable control, CMI shall credit the Licensee against the Monthly Service Fee due for that month at the rate of ten percent (10%) of such Monthly Service Fee for the affected month for every five percent (5%) of Scheduled Uptime by which the availability of the core functionality of SEVOCITY® in that month falls below ninety-five percent (95%) of Scheduled Uptime; (b) if failure to meet the Performance Criteria is caused in predominant part by events within CMI’s commercially reasonable control and in part by acts or omissions of third parties, failure of third party systems or equipment or other events beyond CMI’s commercially reasonable control, CMI shall credit the Licensee against the Monthly Service Fee due for that month at the rate of ten percent (10%) of its Monthly Service Fee amount for the affected month for every eight percent (8%) of Scheduled Uptime by which the availability of the substantial functionality of SEVOCITY® in that month falls below ninety-five percent (95%) of Scheduled Uptime; and (c) if failure to meet the Performance Criteria is caused in predominant part by events outside CMI’s commercially reasonable control or is caused in any degree by the fault, negligence or breach of Licensee,...

Related to No Trojan Horse or Others Similar Routines

  • Unbundled Network Element Combinations 5.1. Unbundled Network Element Combinations shall include: 1) Enhanced Extended Links (EELs); 2) UNE Loops/Special Access Combinations; 3) Loop/Port Combinations; and 4)

  • Programming Processor is not responsible for programming or reprogramming of fuel dispensers.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Video This restriction includes, but is not limited to, use of the Beat and/or New Song in television, commercials, film/movies, theatrical works, video games, and in any other form on the Internet which is not expressly permitted herein.

  • Volunteer Firefighting Leave Leave without pay will be granted when an employee who is a volunteer firefighter is called to duty to respond to a fire, natural disaster or medical emergency.

  • User A Person utilizing the Cable Television System, including all related facilities for purposes of production and/or transmission of electronic or other Signals as opposed to utilization solely as a Subscriber.

  • Unbundled Network Elements 35.4.1. The charges that CLEC shall pay to Sprint for Unbundled Network Elements are set forth in Table One of this Agreement. 35.5. Collocation 35.5.1. The charges that CLEC shall pay to Sprint for Collocation are set forth in Table Two of this Agreement. 35.6. Call Related Databases 6.1. The charges that CLEC shall pay to Sprint for Call Related Databases purchased pursuant to Part J are set forth in Table One of this Agreement.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • Unbundled Loop Modifications (Line Conditioning 2.5.1 Line Conditioning is defined as routine network modification that BellSouth regularly undertakes to provide xDSL services to its own customers. This may include the removal of any device, from a copper Loop or copper Subloop that may diminish the capability of the Loop or Subloop to deliver high-speed switched wireline telecommunications capability, including xDSL service. Such devices include, load coils, excessive bridged taps, low pass filters, and range extenders. Excessive bridged taps are bridged taps that serves no network design purpose and that are beyond the limits set according to industry standards and/or the BellSouth’s TR 73600 Unbundled Local Loop Technical Specification. 2.5.2 BellSouth will remove load coils only on copper Loops and Subloops that are less than eighteen thousand (18,000) feet in length. 2.5.3 For any copper loop being ordered by NewPhone which has over six thousand (6,000) feet of combined bridged tap will be modified, upon request from NewPhone, so that the loop will have a maximum of six thousand (6,000) feet of bridged tap. This modification will be performed at no additional charge to NewPhone. Loop conditioning orders that require the removal of bridged tap that serves no network design purpose on a copper Loop that will result in a combined total of bridged tap between two thousand five hundred (2,500) and six thousand (6,000) feet will be performed at the rates set forth in Exhibit A. 2.5.4 NewPhone may request removal of any unnecessary and non-excessive bridged tap (bridged tap between zero (0) and two thousand five hundred (2,500) feet which serves no network design purpose), at rates pursuant to BellSouth’s SC Process as mutually agreed to by the Parties. 2.5.5 Rates for ULM are as set forth in Exhibit A. 2.5.6 BellSouth will not modify a Loop in such a way that it no longer meets the technical parameters of the original Loop type (e.g., voice grade, ADSL, etc.) being ordered. 2.5.7 If NewPhone requests ULM on a reserved facility for a new Loop order, BellSouth may perform a pair change and provision a different Loop facility in lieu of the reserved facility with ULM if feasible. The Loop provisioned will meet or exceed specifications of the requested Loop facility as modified. NewPhone will not be charged for ULM if a different Loop is provisioned. For Loops that require a DLR or its equivalent, BellSouth will provide LMU detail of the Loop provisioned. 2.5.8 NewPhone shall request Loop make up information pursuant to this Attachment prior to submitting a service inquiry and/or a LSR for the Loop type that NewPhone desires BellSouth to condition. 2.5.9 When requesting ULM for a Loop that BellSouth has previously provisioned for NewPhone, NewPhone will submit a SI to BellSouth. If a spare Loop facility that meets the Loop modification specifications requested by NewPhone is available at the location for which the ULM was requested, NewPhone will have the option to change the Loop facility to the qualifying spare facility rather than to provide ULM. In the event that BellSouth changes the Loop facility in lieu of providing ULM, NewPhone will not be charged for ULM but will only be charged the service order charges for submitting an order.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!