Storage, backup and archiving Sample Clauses

Storage, backup and archiving. The Customer wishes to comply with the principles of Data Lifecycle Management, where Backup/Restore is a key component to ensure data security and integrity. The goal is to use centralized storage and backup/restore to the greatest possible extent. Services for storage, backup and archiving of data are operated by the Customer's service provider. No. Requirement Importance (O/H/M/L) Describe T 96 The system should use storage solutions that can be delivered by the Customer's service provider. Clarify any vendor-specific requirements to storage solution. Note: This may for example be storage principles, file system, disk volume, read/write speed, etc. H D T 97 Backup of disk, including software, configuration, calibration, etc., on server must run towards existing centralized and automated backup services at the Customer. O T 98 The Contractor is asked to clarify any vendor-specific requirements and recommendations for backup, for examples limitations related to the use of backup agent installed on servers belonging to the system. H D T 99 Backup of databases should run against existing centralized and automated backup services operated by the Customer's service provider. H T 100 The Contractor is asked to clarify any vendor-specific requirements and recommendations for database backup. H D No. Requirement Importance (O/H/M/L)‌ Describe T 101 Databases included in the system should support both full and incremental backups (through e.g. log backup/log shipping) of databases. O T 102 Servers included in the system must permit the use of snapshots for backup of virtual machines. H T 103 The system should support automatic archiving of data based on configurable policies to different levels in the Customer's storage solutions, and manual archiving as needed. M D
AutoNDA by SimpleDocs

Related to Storage, backup and archiving

  • Archiving You may make one copy of the Software solely for archival purposes. If the Software is an upgrade, you may use the Software only in conjunction with upgraded product. If you receive your first copy of the Software electronically, and a second copy on media afterward, the second copy can be used for archival purposes only. For all Neevia Tech products, you agree that you will only use our software on a server and all applications that will access the server will reside on the server and you will not permit remote access to the software except through your application residing on the server. You agree to surrender your license(s) if you violate this agreement. If you violate this agreement, you will not receive a refund upon termination of this license. You agree not to utilize our software to violate the copyright of any third parties. If you do violate the copyright of a third party utilizing our software, you agree to hold Neevia Tech harmless and will indemnify Neevia Tech for any such activity even if the violation is unintentional. COPYRIGHT The Software is owned by Neevia Tech and/or its suppliers, and is protected by the copyright and trademark laws of the United States and related applicable laws. You may not copy the Software except as set forth in the "License" section. Any copies that you are permitted to make pursuant to this Agreement must contain the same copyright and other proprietary notices that appear on or in the Software. You may not rent, lease, sub-license, transfer, or sell the Software. You may not modify, translate, reverse engineer, decompile, disassemble, or create derivative works based on the Software, except to the extent applicable law expressly prohibits such foregoing restriction. You may use the trademarks to identify the Software owner's name, or to identify printed output produced by the Software. Such use of any trademark does not give you any rights of ownership in that trademark. NO WARRANTY LICENSED SOFTWARE (S) - "AS IS" The Software is provided AS IS. NEEVIA TECH AND ITS SUPPLIERS MAKE NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE MERCHANTABILITY, QUALITY, NONINFRINGEMENT OF THIRD PARTY RIGHTS, FITNESS FOR A PARTICULAR PURPOSE, AND THOSE ARISING BY STATUTE OR OTHERWISE IN LAW OR FROM A COURSE OF DEALING OR USAGE OF TRADE. THE ENTIRE RISK AS TO THE QUALITY, RESULTS BY USING THE SOFTWARE, AND PERFORMANCE OF THE SOFTWARE IS WITH THE END USER. Some states or jurisdictions do not allow the exclusion or limitation of incidental, consequential or special damages, or the exclusion of implied warranties or limitations on how long an implied warranty may last, so the above limitations may not apply to you or your company.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Archiving and Reuse Self-Archiving: The Publisher permits the Rights Holder to archive the Contribution in accordance with the Publisher's guidelines, the current version of which is set out in the Appendix "Author's Self-Archiving Guidelines".

  • Global Access Transport Charges (U S. Bridged): Per-minute per-bridge port usage charges, based on availability of service, zone and origination access type. Bridging charges are additional and are priced at Customer's applicable Toll Meet Meet-Me Access rate per minute. Freephone (IFN) Transport Zone A – G. Discounts:

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Meter and Cabling Be obliged to draw electricity lines/wires, television cables, broadband data cables and telephone cables to the said Apartment only through the ducts and pipes provided therefor, ensuring that no inconvenience is caused to the Promoter or to other apartment owners. The main electricity meter shall be installed only at the space designated for common meters. The Allottee shall under no circumstances be entitled to affix, draw or string wires, cables, dish antennae or pipes from, to or through any part or portion of and outside walls of the building in which the Apartment is located save in the manner indicated by the Promoter/Association (upon formation).

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Time is Money Join Law Insider Premium to draft better contracts faster.