Six Sigma Sample Clauses

Six Sigma. First Data will implement the following RCSI Six Sigma requirements: (i) By not later than twelve (12) months following the FAAR Effective Date, First Data shall deliver Level 1, 2, 3, 4, and 5 process flows for all of its processes which affect the Services or RCSI. (ii) By not later than twelve (12) months following the FAAR Effective Date, First Data shall implement SIPOC, FMEA and PCS for each of the foregoing processes. (iii) By not later than six (6) months following the FAAR Effective Date, First Data shall undertake and complete a Six Sigma baseline analysis of those of its operations relating to or affecting the Services and provide the results of that analysis to RCSI. (iv) First Data shall *** improvement in all of its operations relating to or affecting the Services and will provide RCSI information sufficient to demonstrate such improvement. (v) Each year of the Term, First Data shall devote at least *** of its general and administrative expenses to establishing and operating programs to introduce and maintain a level of quality of the Services consistent with this Section 9.7. (vi) By not later than the *** anniversary of the FAAR Effective Date, or for those individuals first assigned to the RCSI account after the FAAR Effective Date, within *** months of their being assigned responsibility in connection with providing management services on the First Data’s RCSI account, *** First Data Table of Contents Personnel providing management services on First Data’s RCSI account shall successfully complete RCSI’s Six Sigma Green Belt instruction and not less than *** of the First Data Personnel on the First Data RCSI account (but at least *** such individuals) shall have successfully completed RCSI’s Six Sigma Black Belt instruction. (vii) Any Six Sigma instruction provided by RCSI to First Data Personnel shall be to classes comprised solely of First Data Personnel. (viii) A First Data employee will be identified and will be certified as a Master Black Belt (a “Quality Leader”). This individual will be identified within thirty (30) days of the FAAR Effective Date. (ix) First Data will maintain a staff of full-time Black Belts equal to at least *** (rounded up to the next whole number) of the total number of individuals assigned to the RCSI Account Management Team dedicated to the RCSI-First Data relationship. These individuals will each be required to complete one project per year directly benefiting the provision of Services by First Data to RCSI.
AutoNDA by SimpleDocs
Six Sigma. For the avoidance of doubt, the parties understand and agree that that certain Consulting Agreement between the Company and Six Sigma Academy International, L.L.C. (the “Six Sigma Contract”) is a service contract that requires bifurcation between the New Diamond Business and the Retained Business, as described on Schedules 1.2, 1.6, 1.7 and 1.10 to the Agreement, and that the Retained Business’s share of obligations pursuant to the Six Sigma Contract are Retained Liabilities.

Related to Six Sigma

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Support Services Rehabilitation, counselling and EAP’s. Support is strictly non- punitive, and can be accessed at anytime (self-identification of the need for help is strongly encouraged).

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Technical Support Services 2.1 The technical support services (the "Services"): Party A agrees to provide to Party B the relevant services requested by Party B, which are specified in Exhibit 1 attached hereto ("Exhibit 1").

  • Small and medium-sized enterprises 1. The Parties will promote a favourable environment for the development of the small and medium enterprises (SME) on the basis of strengthening of the relevant private and governmental bodies, as well as the exchange of experiences and good practices with the SME. 2. Cooperation shall include, among other subjects: (a) the designing and development of mechanisms to encourage partnership and productive chain linkage development; (b) development of human resources and management skills to increase the knowledge of the Chinese and Peruvian markets; (c) defining and developing methods and strategies for clusters development; (d) increasing access to information regarding mandatory procedures and any other relevant information for an SME exporter; (e) defining technological transference: programs oriented to transfer technological innovation to SME and to improve their productivity; (f) increasing access to information on technological promotion programs for SME and financial support and encouragement programs for SME; (g) supporting new exporting SME (sponsorship, credits and guarantees, seed capital); and (h) encouraging partnership and information exchange for SME financing institutions (credits, banks, guarantee organizations, seed capital firms). 3. Cooperation shall be developed, among other activities, through: (a) information exchange; (b) conferences, seminars, experts dialogue and training programs with experts; and (c) promoting contacts between economic operators, encouraging opportunities for industrial and technical prospecting.

  • Linking to the Website and Social Media Features You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval, or endorsement on our part. This Website may provide certain social media features that enable you to: • Link from your own or certain third-party websites to certain content on this Website. • Send emails or other communications with certain content, or links to certain content, on this Website. • Cause limited portions of content on this Website to be displayed or appear to be displayed on your own or certain third-party websites. You may use these features solely as they are provided by us, and solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not: • Establish a link from any website that is not owned by you. • Cause the Website or portions of it to be displayed on, or appear to be displayed by, any other site, for example, framing, deep linking, or in-line linking. • Link to any part of the Website other than the homepage. • Otherwise take any action with respect to the materials on this Website that is inconsistent with any other provision of these Terms of Use. The website from which you are linking, or on which you make certain content available, must comply in all respects with the Content Standards set out in these Terms of Use. You agree to cooperate with us in causing any unauthorized framing or linking immediately to stop. We reserve the right to withdraw linking permission without notice. We may disable all or any social media features and any links at any time without notice in our discretion.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!