SunPower Limited Data Rights Sample Clauses

SunPower Limited Data Rights. Customer agrees that SunPower shall have limited rights (collectively, “SunPower’s Limited Rights”) to any system monitoring data gathered by or on behalf of Customer in connection with SunPower’s performance under this Agreement and any and all compilations, reports, extractions or copies of such data created by SunPower (collectively, the “System Monitoring Data”). SunPower’s Limited Rights in the System Monitoring Data include: (a) a limited right to collect, store, manipulate and provide to a third party the System Monitoring Data as requested by Customer pursuant to this Agreement or as reasonably required for SunPower or its Representatives to perform SunPower’s obligations set forth in this Agreement or further agreement; (b) a right to analyze the System Monitoring Data for internal business purposes, including product performance analysis, maintenance planning, and any energy storage planning, engineering, or storage solutions; and (c) a right to use the System Monitoring Data on a bulk anonymized basis for external business and marketing purposes. Notwithstanding anything herein to the contrary, any data that is not Customer’s confidential information shall not be considered System Monitoring Data and shall not be subject to any limitations on use by SunPower.
AutoNDA by SimpleDocs

Related to SunPower Limited Data Rights

  • Limited Software Warranty MyECheck represents, warrants, and covenants that: MyECheck warrants to the original end user (“Customer”), and not to subsequent end users, of the Extreme Networks software product (“Software”) that for ninety (90) days from the date of installation of the Software from MyECheck, the Software shall substantially conform with the specification for the Software at the (“Documentation”). MyECheck does not warrant (i) that the Software is error free, (ii) that Customer will be able to operate the Software without problems or interruptions or (iii) that the Software will be free of vulnerability to intrusion or attack. Except for the limited warranty set forth in this section, the Software is provided “AS IS.”

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Unbundled Voice Loop – SL2 (UVL-SL2 Loops may be 2-wire or 4-wire circuits, shall have remote access test points, and will be designed with a DLR provided to NewPhone. SL2 circuits can be provisioned with loop start, ground start or reverse battery signaling. OC is provided as a standard feature on XX0 Xxxxx. The OC feature will allow NewPhone to coordinate the installation of the Loop with the disconnect of an existing customer’s service and/or number portability service. In these cases, BellSouth will perform the order conversion with standard order coordination at its discretion during normal work hours.

  • BUY AMERICA ACT (National School Lunch Program and Breakfast Program With respect to products purchased by Customers for use in the National School Lunch Program and/or National School Breakfast Program, Contractor shall comply with all federal procurement laws and regulations with respect to such programs, including the Buy American provisions set forth in 7 C.F.R. Part 210.21(d), to the extent applicable. Contractor agrees to provide all certifications required by Customer regarding such programs. In the event Contractor or Contractor’s supplier(s) are unable or unwilling to certify compliance with the Buy American Provision, or the applicability of an exception to the Buy American provision, H-GAC Customers may decide not to purchase from Contractor. Additionally, H-GAC Customers may require country of origin on all products and invoices submitted for payment by Contractor, and Contractor agrees to comply with any such requirement.

  • Software Casos de Uso Red Hat Enterprise Linux Desktop Red Hat Enterprise Linux Workstation Sistemas de computadoras personales con el fin principal de ejecutar aplicaciones y/o servicios para un usuario único que por lo general trabaja con una conexión directa al teclado y la pantalla. Nota: La implantación de autorizaciones asociadas de sistema Red Hat Network o Módulos de Gestión Inteligente en un sistema que no sea Red Hat Enterprise Linux Desktop o Workstation no es un Caso de Uso soportado.

  • Software Warranty We warrant that the Tyler Software will perform without Defects during the term of this Agreement. If the Tyler Software does not perform as warranted, we will use all reasonable efforts, consistent with industry standards, to cure the Defect in accordance with the maintenance and support process set forth in Section C(9), below, the SLA and our then current Support Call Process.

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Unbundled Copper Loop – Designed (UCL-D) 2.4.2.1 The UCL-D will be provisioned as a dry copper twisted pair (2- or 4-wire) Loop that is unencumbered by any intervening equipment (e.g., filters, load coils, range extenders, digital loop carrier, or repeaters).

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.