Process Role Users Sample Clauses

Process Role Users. The process role users belong to subsets of the broad range of future GIMDE 2K users. These subsets are divided into either applications or broad functional areas identified in the GIMDE 2K Concept of Operations. The table below shows the resulting categories of users, divided first by process area and then by job title. The table, when completed will show the numbers of users in each role and how many it would be reasonable to interview. The guideline for setting these numbers is: conduct at least 2 interviews per role with a minimum of 6 for each functional category. The numbers of interviews will be greater for larger communities of future users. This table will be completed with the assistance of the Core Reps. Use or disclosure of data contained on this sheet is subject to the restriction on the title page of this proposal. User Participants Process Area Job Title Number Number to Interview ----------------------------------------------------------------------------------------------------------------------- Bethesda Reston St. Louis ----------------------------------------------------------------------------------------------------------------------- Production Planning TBD 40 ----------------------------------------------------------------------------------------------------------------------- Forecasting ----------------------------------------------------------------------------------------------------------------------- Planning ----------------------------------------------------------------------------------------------------------------------- Requirements Collection & Pre-Planning ----------------------------------------------------------------------------------------------------------------------- Requirements Analyst ----------------------------------------------------------------------------------------------------------------------- Regional Analyst ----------------------------------------------------------------------------------------------------------------------- Production Manager ----------------------------------------------------------------------------------------------------------------------- Plans Officer ----------------------------------------------------------------------------------------------------------------------- Baseline Process Flow Construction 12 ----------------------------------------------------------------------------------------------------------------------- TBD ---------------------------------------------...
AutoNDA by SimpleDocs

Related to Process Role Users

  • End Users LICENSEE agrees to require all direct recipients of Licensed Products to whom Licensed Products are sold, leased, or otherwise disposed of by LICENSEE or its sublicensees, to look only to LICENSEE and not to LICENSOR or its affiliates for any claims, warranties, or liability relating to such Licensed Products. LICENSEE agrees to take all steps to reasonably assure itself that Licensed Products sold, leased or otherwise disposed of by or for LICENSEE is being used for permitted purposes only.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • SERVICE XXXX USE A. Controlled Affiliate recognizes the importance of a comprehensive national network of independent BCBSA licensees which are committed to strengthening the Licensed Marks and Name. The Controlled Affiliate further recognizes that its actions within its Service Area may affect the value of the Licensed Marks and Name nationwide.

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Customer Data Customer shall remain the sole and exclusive owner of all Customer Data and other Confidential Information (as hereinafter defined), regardless of whether such data is maintained on magnetic tape, magnetic disk, or any other storage or processing device. All such Customer Data and other Confidential Information shall, however, be subject to regulation and examination by the appropriate auditors and regulatory agencies to the same extent as if such information were on Customer's premises. "Customer Data" means any and all data and information of any kind or nature submitted to M&I by Customer, or received by M&I on behalf of Customer, in connection with the Services.

  • Review Systems; Personnel It will maintain business process management and/or other systems necessary to ensure that it can perform each Test and, on execution of this Agreement, will load each Test into these systems. The Asset Representations Reviewer will ensure that these systems allow for each Review Receivable and the related Review Materials to be individually tracked and stored as contemplated by this Agreement. The Asset Representations Reviewer will maintain adequate staff that is properly trained to conduct Reviews as required by this Agreement.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Designated Configuration; Trained Personnel State Street and the Fund shall be responsible for supplying, installing and maintaining the Designated Configuration at the Designated Locations. State Street and the Fund agree that each will engage or retain the services of trained personnel to enable both parties to perform their respective obligations under this Addendum. State Street agrees to use commercially reasonable efforts to maintain the System so that it remains serviceable, provided, however, that State Street does not guarantee or assure uninterrupted remote access use of the System.

  • Monthly Data Download Not later than fifteen (15) days after the end of each month, beginning with the month in which the Commencement Date occurs and ending with the Final Shared-Loss Month, Assuming Institution shall provide Receiver:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!