Node Hosting Sample Clauses

Node Hosting. Each Member will host at least one server running the Hedera hashgraph consensus algorithm (each such server, a “Node”) in accordance with the terms specified in the current Hedera Node Policy, substantially in the form attached here as Exhibit B, as amended from time to time as set forth therein. Each Member will follow cybersecurity best practices in ensuring the security of each Node. The Council will provide each Member with the Node software, associated wallets, and standards for security. A Member may designate an Affiliate to host a Node on its behalf in satisfaction of this requirement; provided, however, that such Affiliate shall be responsible for complying with the Hedera Node Policy as if a party thereto; and, provided, further, that the Member will remain fully responsible for the acts and omissions of such Affiliate.
AutoNDA by SimpleDocs
Node Hosting. Each Member will host at least one server running the Hedera hashgraph consensus algorithm (each such server, a “Node”) in accordance with the terms specified in the current Member Node Hosting Terms, substantially in the fo... Section 8.2

Related to Node Hosting

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Hosting 46.7.4.1 At CLEC’s request, SBC-SWBT and SBC-AMERITECH shall perform hosting responsibilities for the provision of billable message data and/or access usage data received from CLEC for distribution to the appropriate billing and/or processing location or for delivery to CLEC of such data via SBC-SWBT’s and SBC-AMERITECH’s internal network or the nationwide CMDS network pursuant to the applicable Appendix HOST, which is/are attached hereto and incorporated herein by reference.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Links If The Services are made available through the Internet, the Financial Institution’s website may provide links to other websites, including those of Third Parties who may also provide services to You. You acknowledge that all those other websites and Third Party services are independent from the Financial Institution’s and may be subject to separate agreements that govern their use. The Financial Institution and Central 1 have no liability for those other websites or their contents or the use of Third Party services. Links are provided for convenience only, and You assume all risk resulting from accessing or using such other websites or Third Party services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!