Skykick Backup – Office/Microsoft 365 Sample Clauses

Skykick Backup – Office/Microsoft 365. Reselling Skykick Backup services. This software is used to make automatic backups of data in the Office 365 cloud (such as e-mail, sharepoint, teams and Onedrive) several times a day.
AutoNDA by SimpleDocs

Related to Skykick Backup – Office/Microsoft 365

  • Online Services Microsoft warrants that each Online Service will perform in accordance with the applicable SLA during Customer’s use. Customer’s remedies for breach of this warranty are in the SLA. The remedies above are Customer’s sole remedies for breach of the warranties in this section. Customer waives any breach of warranty claims not made during the warranty period.

  • Digital Health The HSP agrees to:

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Network Etiquette You are expected to abide by the generally accepted rules of network etiquette. These include but are not limited to the following:

  • xxx/OpenGovernment/LobbingAtOrangeCounty aspx A lobbying blackout period shall commence upon issuance of the solicitation until the Board selects the Contractor. For procurements that do not require Board approval, the blackout period commences upon solicitation issuance and concludes upon contract award. The County may void any contract where the County Mayor, one or more County Commissioners, or a County staff person has been lobbied in violation of the black-out period restrictions of Ordinance No. 2002-15. • Orange County Protest Procedures xxxx://xxx.xxxxxxxxxxxxxx.xxx/VendorServices/XxxxxxXxxxxxxXxxxxxxxxx.xx px Failure to file a protest with the Manager, Procurement Division by 5:00 PM on the fifth full business day after posting, shall constitute a waiver of bid protest proceedings.

  • Special Service networks The following services must be received from special service network providers in order to be covered. All terms and conditions outlined in the Summary of Benefits apply.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!