Priority Model Sample Clauses

Priority Model. Code Description/ impact Escalation Examples Critical - Enterprise-wide impact - Critical impact on business revenue. - Production unable to process mission critical activities. - Possible data loss or corruption. - Notify SPOC. - Escalate to Constellation manager support within 10 minutes. - Constellation support to respond back to SPE rep w/in 5 minutes with initial status. - Constellation support to provide status w/in 30 minutes of incident request and every hour then on until service is restored. - Constellation to dedicate appropriate resources to resolve interruption full time until service is restored. - User interface portal unavailable. - Widespread virus outbreak. - System response time exceedingly slow. High - Loss of non-critical functionality or performance impacting non-critical workflow(s). - Production unable to perform certain non-critical aspects of their job due to system impairment. - Notify SPOC. - Escalate to Constellation manager support within 3 hours if service still not restored. - Constellation support to respond back to SPE rep w/in 2 hours with status. - Constellation support to provide status every 4-hours until service is restored. - Constellation to provide plan on when issue will be addressed. - Slow response time for non- critical functionality. - Asynchronous transfer of files slow, but not impacting production activities. Low - Loss of non-critical functionality without any direct impact to productions which can be quickly resolved via work-around - Notify SPOC. - Escalate to Constellation manager support within 4 hours and provide workaround. - Constellation support to respond back to SPE rep w/in 1- day with status. - Constellation support to provide status every day until service is fully restored. - Constellation to provide plan on when issue will be addressed. - Non-critical functionality of user interface.
AutoNDA by SimpleDocs
Priority Model. Code Description/ impact Escalation Examples Critical – business - Enterprise-wide impact - Notify SPOC. - User interface portal unavailable. hours (MF 9am- - Critical impact on - Escalate to Software manager - Widespread virus outbreak. 6pm PST) business revenue. support within 10 minutes. - System response time - Production unable to - Software support to respond exceedingly slow. process mission critical back to SPE rep w/in 30 minutes activities. with initial status. - Possible data loss or - Software support to provide corruption. status w/in 30 minutes of C O N F I D E N T I A L incident request and every hour then on until service is restored. - Software to dedicate appropriate resources to resolve interruption full time until service is restored. - On site response within 12 hours if required. Critical – non business hours - Enterprise-wide impact - Critical impact on business revenue. - Production unable to process mission critical activities. - Possible data loss or corruption. - Notify SPOC. - Escalate to Software manager support within 10 minutes. - Software support to respond back to SPE rep w/in 1 hour with initial status. - Software support to provide status w/in 1 hour of incident request and every hour then on until service is restored. - Software to dedicate appropriate resources to resolve interruption full time until service is restored. - On site response within 12 hours if required. - User interface portal unavailable. - Widespread virus outbreak. - System response time exceedingly slow. High - Loss of non-critical functionality or performance impacting non-critical workflow(s). - Production unable to perform certain non-critical aspects of their job due to system impairment. - Notify SPOC. - Escalate to Software manager support within 3 hours if service still not restored. - Software support to respond back to SPE rep w/in 2 hours with status. - Software support to provide status every 4 hours until service is restored. - Software to provide plan on when issue will be addressed. - Slow response time for non- critical functionality. - Asynchronous transfer of files slow, but not impacting production activities. Low - Loss of non-critical functionality without any direct impact to productions which can be quickly resolved via work-around - Notify SPOC. - Escalate to Software manager support within 4 hours and provide workaround. - Software support to respond back to SPE rep w/in 1-day with status. - Software support to provide status e...

Related to Priority Model

  • PRIORITY OF USE Any schedule or milestone in this Agreement is estimated based upon the Parties' current understanding of the projected availability of NASA goods, services, facilities, or equipment. In the event that NASA's projected availability changes, Partner shall be given reasonable notice of that change, so that the schedule and milestones may be adjusted accordingly. The Parties agree that NASA's use of the goods, services, facilities, or equipment shall have priority over the use planned in this Agreement. Should a conflict arise, NASA in its sole discretion shall determine whether to exercise that priority. Likewise, should a conflict arise as between two or more non-NASA Partners, NASA, in its sole discretion, shall determine the priority as between those Partners. This Agreement does not obligate NASA to seek alternative government property or services under the jurisdiction of NASA at other locations.

  • Priority Hiring If the Contract Amount is over $200,000 and this Agreement is for services (other than Consulting Services), this section is applicable. Contractor shall give priority consideration in filling vacancies in positions funded by this Agreement to qualified recipients of aid under Welfare and Institutions Code section 11200 in accordance with PCC 10353.

  • Priorities If the Trustee collects any money pursuant to this Article 6, it shall pay out the money in the following order:

  • License Model The software is licensed under two models: • Perpetual License Model – Under this model, you have licensed the software under perpetual license terms, as code that is installed on your premises or hosted for you by a third party acting as your agent (“Perpetual License Model”).

  • PRIORITY HIRING CONSIDERATIONS If this Contract includes services in excess of $200,000, the Contractor shall give priority consideration in filling vacancies in positions funded by the Contract to qualified recipients of aid under Welfare and Institutions Code Section 11200 in accordance with Pub. Contract Code §10353.

  • Priority If the Managing Underwriter or Underwriters of any proposed Underwritten Offering of Common Units included in an Underwritten Offering involving Included Registrable Securities advises the Partnership that the total amount of Common Units that the Selling Holders and any other Persons intend to include in such offering exceeds the number that can be sold in such offering without being likely to have an adverse effect on the price, timing or distribution of the Common Units offered or the market for the Common Units, then the Common Units to be included in such Underwritten Offering shall include the number of Registrable Securities that such Managing Underwriter or Underwriters advises the Partnership can be sold without having such adverse effect, with such number to be allocated (i) first, to the Partnership and (ii) second, pro rata among the Selling Holders who have requested participation in such Underwritten Offering and any other holder of securities of the Partnership having rights of registration that are neither expressly senior nor subordinated to the Registrable Securities (the “Parity Securities”). The pro rata allocations for each Selling Holder who has requested participation in such Underwritten Offering shall be the product of (a) the aggregate number of Registrable Securities proposed to be sold in such Underwritten Offering multiplied by (b) the fraction derived by dividing (x) the number of Registrable Securities owned on the Closing Date by such Selling Holder by (y) the aggregate number of Registrable Securities owned on the Closing Date by all Selling Holders plus the aggregate number of Parity Securities owned on the Closing Date by all holders of Parity Securities that are participating in the Underwritten Offering.

  • Single User License A Single-User license is for a named individual who is identified as the only Authorized User. This user is not permitted to re-assign, transfer, or sublicense the software, except as described in Section 5, Transfer. This user may install and use the software on up to three computers, as long as the single-user Customer is the sole user of the software. If the computer on which this Software is loaded is attached to a network, this Software must not be accessible by any other user on such network. Single-user licenses may not be installed or used in a virtualized environment in order to or in a manner that circumvents the single user license type.

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).

  • Priority Lien Status The County’s right to receive FILOT payments hereunder shall have a first priority lien status pursuant to Sections 12-44-90(E) and (F) of the FILOT Act and Chapters 4, 49, 51, 53, and 54 of Title 12 of the Code.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

Time is Money Join Law Insider Premium to draft better contracts faster.