Selection and Use of the SaaS Services Sample Clauses

Selection and Use of the SaaS Services. Customer accepts sole responsibility for (a) the selection of the SaaS Services to achieve Customer’s intended results; (b) the use of the SaaS Services; (c) the results obtained from the SaaS Services and the use of those results; (d) lost or damaged Customer Data not directly caused by Grass Valley’s breach of this Agreement; and (e) the adoption of procedures and safeguards (e.g., regular data backups) to prevent loss of or damage to Customer Data. Customer also accept sole responsibility for the selection and use of, and results obtained from, any other programs, programming, equipment, or services used with the SaaS Services, including the Customer Devices. Customer accepts sole responsibility for all loss, claim, liability, or damage, and related costs and expenses arising directly or indirectly out of or in any way related to Customer’s own fault or negligence. This clause shall survive the Term of this Agreement.
AutoNDA by SimpleDocs
Selection and Use of the SaaS Services. Managed Service Provider accepts sole responsibility for (a) the selection of the SaaS Services to achieve Managed Service Provider’s intended results; (b) the use of the SaaS Services; (c) the results obtained from the SaaS Services and the use of those results; (d) lost or damaged Managed Service Provider Data not directly caused by Grass Valley’s breach of this Agreement; and (e) the adoption of procedures and safeguards (e.g., regular data backups) to prevent loss of or damage to Managed Service Provider Data. Managed Service Provider also accept sole responsibility for the selection and use of, and results obtained from, any other programs, programming, equipment, or services used with the SaaS Services, including the Managed Service Provider Devices. Managed Service Provider accepts sole responsibility for all loss, claim, liability, or damage, and related costs and expenses arising directly or indirectly out of or in any way related to Managed Service Provider’s own fault or negligence. This clause shall survive the Term of this Agreement.
Selection and Use of the SaaS Services. Advanced Channel Partner accepts sole responsibility for (a) the selection of the SaaS Services to achieve Advanced Channel Partner’s intended results; (b) the use of the SaaS Services; (c) the results obtained from the SaaS Services and the use of those results; (d) lost or damaged Advanced Channel Partner Data not directly caused by Grass Valley’s breach of this Agreement; and (e) the adoption of procedures and safeguards (e.g., regular data backups) to prevent loss of or damage to Advanced Channel Partner Data. Advanced Channel Partner also accept sole responsibility for the selection and use of, and results obtained from, any other programs, programming, equipment, or services used with the SaaS Services, including the Advanced Channel Partner Devices. Advanced Channel Partner accepts sole responsibility for all loss, claim, liability, or damage, and related costs and expenses arising directly or indirectly out of or in any way related to Advanced Channel Partner’s own fault or negligence. This clause shall survive the Term of this Agreement.
Selection and Use of the SaaS Services. Customer accepts sole responsibility for (a) the selection of the SaaS Services to achieve Customer’s intended results;

Related to Selection and Use of the SaaS Services

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • Use of the Service 12.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 12; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 12.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 12.3 You must ensure that any software you use in relation to the Service is properly licensed. 12.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 12.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 12.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 12.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 12.8 You may request additional users on the Service in accordance with the Pricing Schedule. 12.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 12.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Fair Use Policy or upon the request of an authorised authority. 12.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

  • Provision of the Services The Supplier acknowledges and agrees that the Customer relies on the skill and judgment of the Supplier in the provision of the Services and the performance of its obligations under this Call Off Contract. The Supplier shall ensure that the Services: comply in all respects with the description of the Services in Call Off Schedule 2 ( Services) or elsewhere in this Call Off Contract; and are supplied in accordance with the provisions of this Call Off Contract (including the Call Off Tender) and the Tender. The Supplier shall perform its obligations under this Call Off Contract in accordance with: all applicable Law; Good Industry Practice; the Standards; the Security Policy; the ICT Policy (if so required by the Customer); and the Supplier's own established procedures and practices to the extent the same do not conflict with the requirements of Clauses 7.1.3(a) to 7.1.3(e). The Supplier shall: at all times allocate sufficient resources with the appropriate technical expertise to supply the Deliverables and to provide the Services in accordance with this Call Off Contract; subject to Clause 22.1 (Variation Procedure), obtain, and maintain throughout the duration of this Call Off Contract, all the consents, approvals, licences and permissions (statutory, regulatory contractual or otherwise) it may require and which are necessary for the provision of the Services; ensure that any services recommended or otherwise specified by the Supplier for use by the Customer in conjunction with the Deliverables and/or the Services shall enable the Deliverables and/or the Services to meet the requirements of the Customer; ensure that the Supplier Assets will be free of all encumbrances (except as agreed in writing with the Customer); ensure that the Services are fully compatible with any Customer Property or Customer Assets described in Call Off Schedule 4 (Implementation Plan) (or elsewhere in this Call Off Contract) or otherwise used by the Supplier in connection with this Call Off Contract; minimise any disruption to the Sites and/or the Customer's operations when providing the Services; ensure that any Documentation and training provided by the Supplier to the Customer are comprehensive, accurate and prepared in accordance with Good Industry Practice; co-operate with the Other Suppliers and provide reasonable information (including any Documentation), advice and assistance in connection with the Services to any Other Supplier and, on the Call Off Expiry Date for any reason, to enable the timely transition of the supply of the Services (or any of them) to the Customer and/or to any Replacement Supplier; assign to the Customer, or if it is unable to do so, shall (to the extent it is legally able to do so) hold on trust for the sole benefit of the Customer, all warranties and indemnities provided by third parties or any Sub-Contractor in respect of any Deliverables and/or the Services. Where any such warranties are held on trust, the Supplier shall enforce such warranties in accordance with any reasonable directions that the Customer may notify from time to time to the Supplier; provide the Customer with such assistance as the Customer may reasonably require during the Call Off Contract Period in respect of the supply of the Services; deliver the Services in a proportionate and efficient manner; ensure that neither it, nor any of its Affiliates, embarrasses the Customer or otherwise brings the Customer into disrepute by engaging in any act or omission which is reasonably likely to diminish the trust that the public places in the Customer, regardless of whether or not such act or omission is related to the Supplier’s obligations under this Call Off Contract; and gather, collate and provide such information and co-operation as the Customer may reasonably request for the purposes of ascertaining the Supplier’s compliance with its obligations under this Call Off Contract. An obligation on the Supplier to do, or to refrain from doing, any act or thing shall include an obligation upon the Supplier to procure that all Sub-Contractors and Supplier Personnel also do, or refrain from doing, such act or thing. This Clause 8 shall apply if any Services have been included in Annex 1 of Call Off Schedule 2 (Services).

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Performance of the Services In addition to the Common Articles, it is specified that:

  • Sub-adviser’s Use of the Services of Others The Sub-Adviser may (at its cost except as contemplated by Section 5 of this Agreement) employ, retain, or otherwise avail itself of the services or facilities of other persons or organizations for the purpose of obtaining such statistical and other factual information, such advice regarding economic factors and trends, such advice as to occasional transactions in specific securities, or such other information, advice, or assistance as the Sub-Adviser may deem necessary, appropriate, or convenient for the discharge of its obligations hereunder or otherwise helpful to the Sub-Adviser, as appropriate, or in the discharge of Sub-Adviser's overall responsibilities with respect to the other accounts that it serves as investment manager or counselor, provided that the Sub-Adviser shall at all times retain responsibility for making investment recommendations with respect to the Fund.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Manager’s Use of the Services of Others The Manager may (at its cost except as contemplated by Paragraph 4 of this Agreement) employ, retain or otherwise avail itself of the services or facilities of other persons or organizations for the purpose of providing the Manager or the Corporation or Fund, as appropriate, with such statistical and other factual information, such advice regarding economic factors and trends, such advice as to occasional transactions in specific securities or such other information, advice or assistance as the Manager may deem necessary, appropriate or convenient for the discharge of its obligations hereunder or otherwise helpful to the Corporation or Fund, as appropriate, or in the discharge of Manager's overall responsibilities with respect to the other accounts which it serves as investment manager.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!