Cloud Services You will not intentionally (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively impacts the Cloud Service’s operation; or (d) submit any information that is not contemplated in the applicable Documentation.
New Services If, within ninety (90) days after the Distribution Date, a Party desires the other Party to provide additional or different services which such other Party is not expressly obligated to provide under this Agreement (excluding, for the avoidance of doubt, any Additional Services or Service Adjustments, the “New Services”), then such Party will provide a written change request (in the form agreed by the Parties) to the other Party within ninety (90) days after the Distribution Date. The Party receiving such request shall negotiate in good faith to provide such New Service; provided, however, that no Party shall be obligated to provide any New Services, including because the Parties are unable to reach agreement on the terms thereof (including with respect to Service Charges therefor). If the Parties agree to any such New Service, then the Parties shall document such terms in a Service Schedule to be incorporated in Schedule A or Schedule B, as applicable. The Service Schedule shall describe in reasonable detail the nature, scope, service period(s), termination provisions and other terms applicable to such New Services. Each supplement to the applicable Service Schedule, as agreed to in writing by the Parties, shall be deemed part of this Agreement as of the date of such agreement and the New Services set forth therein shall be deemed “Services” provided under this Agreement, in each case subject to the terms and conditions of this Agreement. The Parties shall in good faith determine any costs and expenses, including any start-up costs and expenses, which would be incurred by the Provider in connection with the provision of such New Service, which costs and expenses shall be borne solely by the Recipient.
Hospice Services Services are available for a Member whose Attending Physician has determined the Member's illness will result in a remaining life span of six months or less.
Outside Services Consultant shall not use the service of any other person, entity, or organization in the performance of Consultant’s duties without the prior written consent of an officer of the Company. Should the Company consent to the use by Consultant of the services of any other person, entity, or organization, no information regarding the services to be performed under this Agreement shall be disclosed to that person, entity, or organization until such person, entity, or organization has executed an agreement to protect the confidentiality of the Company’s Confidential Information (as defined in Article 5) and the Company’s absolute and complete ownership of all right, title, and interest in the work performed under this Agreement.
Autism Services This plan covers the following services for the treatment of autism spectrum disorders. • Applied behavior analysis when provided and/or supervised by an individual licensed by the state in which the service is rendered. See the Summary of Medical Benefits for the amount that you pay. • Physical therapy, occupational therapy, and speech therapy services when rendered as part of the treatment of autism spectrum disorder. A benefit limit will not apply to these services. • Psychological and psychiatric services, and prescription drugs are also covered. See Behavioral Health Services and Prescription Drugs and Diabetic Equipment or Supplies for additional information. Coverage for autism spectrum disorders does not affect any obligation of a school district, a state or other governmental entity to provide services to an individual under an individualized family service plan, an individualized education program, or similar services required under state or federal law. Services related to autism that are furnished by school personnel are not covered under this plan.
Directory Assistance Service 8.3.1 Directory Assistance Service provides local end user telephone number listings with the option to complete the call at the caller's direction separate and distinct from local switching.
Routing for Operator Services and Directory Assistance Traffic For a Verizon Telecommunications Service dial tone line purchased by CBB for resale pursuant to the Resale Attachment, upon request by CBB, Verizon will establish an arrangement that will permit CBB to route the CBB Customer’s calls for operator and directory assistance services to a provider of operator and directory assistance services selected by CBB. Verizon will provide this routing arrangement in accordance with, but only to the extent required by, Applicable Law. Verizon will provide this routing arrangement pursuant to an appropriate written request submitted by CBB and a mutually agreed-upon schedule. This routing arrangement will be implemented at CBB's expense, with charges determined on an individual case basis. In addition to charges for initially establishing the routing arrangement, CBB will be responsible for ongoing monthly and/or usage charges for the routing arrangement. CBB shall arrange, at its own expense, the trunking and other facilities required to transport traffic to CBB’s selected provider of operator and directory assistance services.
SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.
Directory Assistance Service Updates 8.3.3.1 BellSouth shall update end user listings changes daily. These changes include: 8.3.3.1.1 New end user connections 3.3.1.2 End user disconnections
Dining Services The Contract is for a space in a University Housing & Dining Services (“UHDS”) facility and not for a particular room or type of housing. By signing this Contract, you agree to accept your residence assignment, and understand this assignment may change. Once you receive a key to your assigned residence or move personal belongings into your room (whichever comes first) you are considered to have taken occupancy (“Occupancy”) and will incur charges. You also agree to familiarize yourself and comply with all University policies governing occupancy, including those set forth in this Contract and in the UHDS publication Student Policy and Information Guide, to be considerate of other residents and to respect the rights of others at all times. The Student Policy and Information Guide may be found at: xxxx://xxxx.xxxx/policy-guide, as well as in paper form when requested at the University Housing & Dining Services Administrative Offices.