Support Services HP’s support services will be described in the applicable Supporting Material, which will cover the description of HP’s offering, eligibility requirements, service limitations and Customer responsibilities, as well as the Customer systems supported.
Project Management Services Contractor shall provide business analysis and project management services necessary to ensure technical projects successfully meet the objectives for which they were undertaken. Following are characteristics of this Service:
Collection Services 5.01 General 5-1 5.02 Solid Waste Collection 5-1 5.03 Targeted Recyclable Materials Collection 5-3
Content and Services Neither Licensor nor the provider of the wireless network is the provider of any financial services available through or related to the Software, and neither Licensor nor the provider of the wireless network or any contractor of the provider of the financial services available through or related to the Software, is responsible for any of the materials, information, products or services made available to you via the Software.
Education services 1.1 Catholic education is intrinsic to the mission of the Church. It is one means by which the Church fulfils its role in assisting people to discover and embrace the fullness of life in Xxxxxx. Catholic schools offer a broad, comprehensive curriculum imbued with an authentic Catholic understanding of Xxxxxx and his teaching, as well as a lived appreciation of membership of the Catholic Church. Melbourne Archdiocese Catholic Schools Ltd (MACS) governs the operation of MACS schools and owns, governs and operates the School.
Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.
Chiropractic Services This plan covers chiropractic visits up to the benefit limit shown in the Summary of Medical Benefits. The benefit limit applies to any visit for the purposes of chiropractic treatment or diagnosis.
Consulting Services 7. Except as ADB may otherwise agree, and except as set forth in the paragraph below, the Borrower shall apply quality- and cost-based selection for selecting and engaging Consulting Services.
Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.
Cloud Services You will not intentionally (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively impacts the Cloud Service’s operation; or (d) submit any information that is not contemplated in the applicable Documentation.