Provider If the Provider is a State Agency, the Provider acknowledges that it is responsible for its own acts and deeds and the acts and deeds of its agents and employees. If the Provider is not a State agency, then the Provider agrees to indemnify and save harmless the State and its officers and employees from all claims and liability due to activities of itself, its agents, or employees, performed under this contract and which are caused by or result from error, omission, or negligent act of the Provider or of any person employed by the Provider. The Provider shall also indemnify and save harmless the State from any and all expense, including, but not limited to, attorney fees which may be incurred by the State in litigation or otherwise resisting said claim or liabilities which may be imposed on the State as a result of such activities by the Provider or its employees. The Provider further agrees to indemnify and save harmless the State from and against all claims, demands, and causes of action of every kind and character brought by any employee of the Provider against the State due to personal injuries and/or death to such employee resulting from any alleged negligent act by either commission or omission on the part of the Provider.
Software Inclusions Restrictions
Instrumentation The acceleration shall be recorded during the test, using equipment in accordance with channel frequency class 1000 as specified in the latest version of ISO 6487.
Firmware 7.1 The Supplier must deliver the equipment, Goods or hardware equipped with all the firmware required to use all the Goods or hardware’s functions. Any software embedded in the equipment, Goods or hardware, including the firmware, is provided to the Local Government with a license to use this software, with all license costs and royalties being included in the Fee Schedule (Schedule C). All firmware will be the most recent version available at the time of shipping.
Enhancements No Enhancement shall be provided in respect of any Series of Notes, nor will any Enhancement Provider have any rights hereunder, as third-party beneficiary or otherwise, unless the Servicer has provided its prior written consent to such Enhancement, such consent not to be unreasonably withheld.
enabled This information is collected by Symantec for the purpose of providing protection and of evaluating and advising You regarding potential threats and risks that may be associated with a particular Web site before You view it. − Executable files that are identified as potential malware, including information on the actions taken by such files at the time of installation. These files are submitted to Symantec using the Software’s automatic submission function. The collected files could contain personally identifiable information that has been obtained by the malware without Your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec’s products to detect malicious behavior. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products. − The name given to the computer during the initial setup of the operating system. If collected, the name will be used by Symantec as an account name for the computer under which You may elect to receive additional services and/or under which You may use certain features of the Software. You may change such account name at any time after installation of the Software (recommended). − Status information regarding installation and operation of the Software. This information indicates to Symantec whether installation of the Software was successfully completed as well as whether the Software has encountered an error. The status information could contain personally identifiable information only if such information is included in the name of the file or folder encountered by the Software at the time of installation or error. The status information is collected by Symantec for the purpose of evaluating and improving Symantec’s product performance and installation success rate. Symantec may also use this information to optimize its web-pages. − Information contained in email messages that you send through the Software to Symantec to report as spam or as incorrectly identified as spam. These email messages may contain personally identifiable information and will be sent to Symantec only with your permission, and will not be sent automatically. If you send such messages to Symantec, Symantec will use them only for the purpose of improving the detection ability of Symantec’s antispam technology. − Information contained in a report that You may choose to send to Symantec through the Software when the Software encounters a problem. The report includes information regarding the status of both the Software and Your computer at the time that the Software encountered the problem. The status information about Your computer may include the system language, country locale, and the operating system version for Your computer, as well as the processes running, their status and performance information, and data from files or folders that were open at the time the Software encountered the problem. The information could contain personally identifiable information if such information is included in, or is a part of the name of the files or folders open at the time the Software encountered the problem. This information will be sent to Symantec only with Your permission, and will not be sent automatically. The information is collected by Symantec for the purpose of correcting the encountered problem and improving Symantec’s product performance. − The Internet Protocol (IP) address and/or Media Access Control (MAC) address and the Machine ID of the computer on which the Software is installed to enable the Software to function and for license administration purposes. − Other general, statistical information used for product analysis, and for improving product functionality. Unless it is expressly defined as optional, the collected information as set out above is necessary for the purpose of the functionality of Symantec’s products. Information may be transferred to the Symantec group in the United States or other countries that may have less protective data protection laws than the region in which You are situated (including the European Union) and may be accessible by Symantec employees or contractors exclusively to be used in accordance with the purposes described above. For the same purposes the information may be shared with partners and vendors that process information on behalf of Symantec. Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection. Subject to applicable laws, Symantec reserves the right to cooperate with any legal process and any law enforcement or other government inquiry related to your use of this Software. This means that Symantec may provide documents and information relevant to a court subpoena or to a law enforcement or other government investigation. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from the information to track and publish reports on security risk trends. By using the Software, You acknowledge and agree that Symantec may collect, transmit, store, disclose and analyze such information for these purposes. In addition, any Data that you transmit or store through the Online Backup Feature will be transferred to and stored in servers located in countries that may have less protective data protection laws than the country in which You are located (including without limitation the United States). These servers are owned and maintained by a third party processor which Symantec has required by contract to safeguard Your Data. If you have any questions about how your Data is being handled, please contact Symantec Customer Service using the contact details in Section 12.
Providers Services performed by a provider who has been excluded or debarred from participation in federal programs, such as Medicare and Medicaid. To determine whether a provider has been excluded from a federal program, visit the U.S. Department of Human Services Office of Inspector General website (xxxxx://xxxxxxxxxx.xxx.xxx.xxx/) or the Excluded Parties List System website maintained by the U.S. General Services Administration (xxxxx://xxx.xxx.gov/). • Services provided by facilities, dentists, physicians, surgeons, or other providers who are not legally qualified or licensed, according to relevant sections of Rhode Island Law or other governing bodies, or who have not met our credentialing requirements. • Services provided by a non-network provider, unless listed as covered in the Summary of Medical Benefits. • Services provided by naturopaths, homeopaths, or Christian Science practitioners.
Model List your model number of the product you are bidding.
Programs An expression of a combination of instructions that causes a computer to function so that it is capable of obtaining a certain result.
Functionality Customer is entitled to additional functionality previously purchased or bundled with the software if available in the version or update released on or after the start date of the Agreement. Customer acknowledges that certain functionality in current and previous software versions may not be available in future upgrades. Added functionality may require additional paid services (clinical and technical) to configure and support.