Submitting Incidents Sample Clauses

Submitting Incidents. In order to obtain technical support covered by this SMA, You have to report the issue or problem to ISC using the contact form provided by ISC or the online input screen on ISC’s online support system (JIRA) (contact details are mentioned hereunder in article 4) and following the support procedure and guidelines set forth in Exhibit I to this Addendum 2. Within the Initial Response Time, ISC shall confirm receipt by e- mail, mention the JIRA registration number, if necessary, ask You for clarification, documentation, description or additional information and, if possible, identify the person (support engineer of ISC) dedicated to delivering technical support. Support will be provided by ISC solely to the authorized individuals designated by You and who are qualified and trained on the Software or Add-On(s). You will be asked to designate a maximum of three authorized support contacts.
AutoNDA by SimpleDocs
Submitting Incidents. In order to obtain technical support covered by this Addendum 2, You have to report the issue or problem to ISA using the contact form provided by ISA or the online input screen on ISA’s online support system (JIRA) (contact details are mentioned hereunder in article 4) and following the support procedure and guidelines set forth in Exhibit I to this Addendum 2. Within the Initial Response Time, ISA shall confirm receipt by e- mail, mention the JIRA registration number, if necessary, ask You for clarification, documentation, description or additional information and, if possible, identify the person (support engineer of ISA) dedicated to delivering technical support. Support will be provided by ISA solely to the authorized individuals designated by You and who are qualified and trained on the Software or Add-On(s). You will be asked to designate a maximum of three authorized support contacts.
Submitting Incidents. 4.1. Who May Submit Incidents Customer must designate authorized Customer Technical Personnel at time of purchase (at least one), unless otherwise specified, who will be the person registering the license. That individual(s) may submit change requests to the list of authorized Customer Technical Personnel in writing through the channel(s) specified for the plan selected. Unless specified in an Order Form, Customer may have no more than 5 Customer Technical Personnel at once. Customer may substitute Customer Technical Personnel in its discretion.
Submitting Incidents. In order to expedite the resolution of any reported incident, to the extent available, you will provide to BPA (i) a full description of the problem, including any actions that initiate the problem state; (ii) the business impact of the problem; the version, edition and build numbers of all software components affected or involved in the affected system (for example, BPA products, Microsoft SharePoint products, Windows Server, including physical or virtual configuration, SQL Server, Internet Explorer); (iii) any applicable log files that help with diagnosis; (iv) any applicable screen capture images that help illustrate the problem Incident reports can only be entered by registered contacts in the BPA Community site.
Submitting Incidents. In order to obtain technical support covered by this Agreement, You have to report the issue or problem to ISK using the contact form provided by ISK or the online input screen on ISK’s online support system (JIRA) (contact details are mentioned hereunder in section 6) and following the support procedure and guidelines set forth in Exhibit I to this Agreement. Within the Initial Response Time, ISK shall confirm receipt by e-mail, mention the JIRA registration number, if necessary, ask You for clarification, documentation, description or additional information and, if possible, identify the person (support engineer of ISK) dedicated to delivering technical support. Support will be provided by ISK solely to the authorized individuals designated by You and who are qualified and trained on the Software or add-on(s). You will be asked to designate a maximum of three authorized support contacts.

Related to Submitting Incidents

  • Reporting Incidents The Interconnection Parties shall report to each other in writing as soon as practical all accidents or occurrences resulting in injuries to any person, including death, and any property damage arising out of the Interconnection Service Agreement.

  • Data Incidents Merchant must report all instances of a Data Incident (as defined in the American Express Merchant Operating Guide) immediately to ISO after discovery of the incident. Merchant must ensure data quality and that Transaction Data and customer information is processed promptly, accurately, and completely, and complies with the American Express Technical Specifications. THE FOLLOWING SERVICES ARE PROVIDED BY ISO ONLY. Bank shall not have any obligation or liability of any nature in connection with such services. PART THREE

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • Notification of Incidents If Contractor becomes aware of or has reasonable suspicion of a privacy incident or security incident regarding any State data, Contractor must report such incident to the State and the State Chief Information Security Officer as soon as possible, but no later than twenty-four (24) hours after such incident. The decision to notify the affected data subjects and the form of such notice following report of a privacy incident or security incident are the responsibility of the State. Notwithstanding anything to the contrary in this Contract, Contractor will indemnify, hold harmless and defend the State and its officers, and employees for and against any claims, damages, costs and expenses related to any privacy incident or security incident involving any State data. For purposes of clarification, the foregoing sentence shall in no way limit or diminish Contractor’s obligation(s) to indemnify, save, hold harmless, or defend the State under any other term of this Contract. Contractor will reasonably mitigate any harmful effects resulting from any privacy incident or security incident involving any State data.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Significant Incidents In addition to notifying the appropriate authorities, Grantee will submit notice to the SUD email box, XxxxxxxxxXxxxx.Xxxxxxxxx@xxxx.xxxxx.xx.xx and Substance Use Xxxxxxxx@xxxx.xxxxx.xx.xx significant incidents involving substantial disruption of Grantee’s program operation or affecting or potentially affecting the health, safety or welfare of the System Agency funded clients or participants within three (3) calendar days of discovery.

  • Evaluation Cycle: Annual Orientation A) At the start of each school year, the superintendent, principal or designee shall conduct a meeting for Educators and Evaluators focused substantially on educator evaluation. The superintendent, principal or designee shall:

Time is Money Join Law Insider Premium to draft better contracts faster.