Submitting Incidents Sample Clauses

Submitting Incidents. In order to obtain technical support covered by this SMA, You have to report the issue or problem to ISC using the contact form provided by ISC or the online input screen on ISC’s online support system (JIRA) (contact details are mentioned hereunder in article 4) and following the support procedure and guidelines set forth in Exhibit I to this Addendum 2. Within the Initial Response Time, ISC shall confirm receipt by e- mail, mention the JIRA registration number, if necessary, ask You for clarification, documentation, description or additional information and, if possible, identify the person (support engineer of ISC) dedicated to delivering technical support. Support will be provided by ISC solely to the authorized individuals designated by You and who are qualified and trained on the Software or Add-On(s). You will be asked to designate a maximum of three authorized support contacts.
AutoNDA by SimpleDocs
Submitting Incidents. In order to obtain technical support covered by this SMA, You have to report the issue or problem to ISA using the contact form provided by ISA or the online input screen on ISA’s online support system (JIRA) (contact details are mentioned hereunder in article 4) and following the support procedure and guidelines set forth in Exhibit I to this Addendum 2. Within the Initial Response Time, ISA shall confirm receipt by e- mail, mention the JIRA registration number, if necessary, ask You for clarification, documentation, description or additional information and, if possible, identify the person (support engineer of ISA) dedicated to delivering technical support. Support will be provided by ISA solely to the authorized individuals designated by You and who are qualified and trained on the Software or Add-On(s). You will be asked to designate a maximum of three authorized support contacts.
Submitting Incidents. 4.1. Who May Submit Incidents 4.2. How to Submit Incidents
Submitting Incidents. In order to expedite the resolution of any reported incident, to the extent available, you will provide to BPA (i) a full description of the problem, including any actions that initiate the problem state; (ii) the business impact of the problem; the version, edition and build numbers of all software components affected or involved in the affected system (for example, BPA products, Microsoft SharePoint products, Windows Server, including physical or virtual configuration, SQL Server, Internet Explorer); (iii) any applicable log files that help with diagnosis; (iv) any applicable screen capture images that help illustrate the problem Incident reports can only be entered by registered contacts in the BPA Community site.
Submitting Incidents. In order to obtain technical support covered by this SMA, You have to report the issue or problem to ISC using the contact form provided by ISC or the online input screen on ISC’s online support system (JIRA) (contact details are mentioned hereunder in article 4) and following the support procedure and guidelines set forth in Exhibit I to the SMA. Within the Initial Response Time, ISC shall confirm receipt by e-mail, mention the JIRA registration number, if necessary, ask You for clarification, documentation, description or additional information and, if possible, identify the person (support engineer of ISC) dedicated to delivering technical support. Support will be provided by ISC solely to the authorized individuals designated by You and who are qualified and trained on the Software. You will be asked to designate a maximum of three authorized support contacts.
Submitting Incidents. 1. Who May Submit Incidents? Support is intended to provide assistance for issues and questions beyond what is covered in the Documentation. At the time of purchase, Customer may designate as many authorized Contacts as required. However, anyone employed and authorized by the Customer may be added at any time through the customer portal or by submitting a request through the support process outlined in this Support Policy.

Related to Submitting Incidents

  • Reporting Incidents The Interconnection Parties shall report to each other in writing as soon as practical all accidents or occurrences resulting in injuries to any person, including death, and any property damage arising out of the Interconnection Service Agreement.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Submitting Investigator An investigator who submitted a genomic dataset to an NIH designated data repository (e.g., dbGaP).

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Employment Eligibility Verification As required by IC § 22-5-1.7, the Contractor swears or affirms under the penalties of perjury that the Contractor does not knowingly employ an unauthorized alien. The Contractor further agrees that: A. The Contractor shall enroll in and verify the work eligibility status of all his/her/its newly hired employees through the E-Verify program as defined in IC § 22-5-1.7-3. The Contractor is not required to participate should the E-Verify program cease to exist. Additionally, the Contractor is not required to participate if the Contractor is self-employed and does not employ any employees. B. The Contractor shall not knowingly employ or contract with an unauthorized alien. The Contractor shall not retain an employee or contract with a person that the Contractor subsequently learns is an unauthorized alien. C. The Contractor shall require his/her/its subcontractors, who perform work under this Contract, to certify to the Contractor that the subcontractor does not knowingly employ or contract with an unauthorized alien and that the subcontractor has enrolled and is participating in the E-Verify program. The Contractor agrees to maintain this certification throughout the duration of the term of a contract with a subcontractor. The State may terminate for default if the Contractor fails to cure a breach of this provision no later than thirty (30) days after being notified by the State.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Significant Incidents In addition to notifying the appropriate authorities, Grantee will submit notice to the SUD email box, XxxxxxxxxXxxxx.Xxxxxxxxx@xxxx.xxxxx.xx.xx and Substance Use Xxxxxxxx@xxxx.xxxxx.xx.xx significant incidents involving substantial disruption of Grantee’s program operation or affecting or potentially affecting the health, safety or welfare of the System Agency funded clients or participants within three (3) calendar days of discovery.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!