Secret Shopper Programs Sample Clauses

Secret Shopper Programs. Contractor shall provide for, at its expense, a secret shopper program to be created in partnership with SGA which shall employ students to measure the quality of Contractor’s service. Students shall be provided with a meal card that allows them to eat and assess one meal per day in a week. Contractor shall also provide an assessment form that can be filled out by the student. Client will work with SGA to designate the secret shoppers and to direct them to the facilities that need to be assessed.

Related to Secret Shopper Programs

  • Programs An expression of a combination of instructions that causes a computer to function so that it is capable of obtaining a certain result.

  • Software The Software is licensed to you subject to any terms and conditions presented when you downloaded it from a source authorized by NCR Voyix, as well as those contained in this Agreement. If there is a conflict, this Agreement will control. You are licensed to use the Software only with the Service and with Hardware purchased or subscribed from NCR Voyix or its Resellers. Your license to any Software will end when your subscription to the Service ends. The Software is copyrighted and licensed, not sold, and is NCR Voyix’s confidential and unpublished information. You will retain any copyright notices and proprietary legends on all copies of the Software and the media on which it is delivered. Any attempt to transfer the Software is void and will automatically cause your license to end.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.