Support Helpdesk Response Time Sample Clauses

Support Helpdesk Response Time. The Support Helpdesk Response Time is defined as the time from when the customer enters the request into the XXXXXX ticketing system or from when XXXXXX receives an email from the customer to the time when XXXXXX replies and starts working on the request. The Response Time is calculated based on the Service Times defined under 6.2. The maximum Response Times vary depending on the
AutoNDA by SimpleDocs
Support Helpdesk Response Time. The Support Helpdesk Response Time is defined as the time from when the customer enters the request into the PakEnergy ticketing system or from when PakEnergy receives an email from the customer to the time when PakEnergy replies and starts working on the request. The Response Time is calculated based on the Service Times defined under 6.B. The maximum Response Times vary depending on the severity of the incident; the priority for resolution is determined by PakEnergy when evaluating the customer’s request:

Related to Support Helpdesk Response Time

  • Response Time PROVIDING PARTY shall respond to and resolve any problems in connection with the Corporate Services for RECEIVING PARTY within a commercially reasonable period of time, using response and proposed resolution times consistent with its response and resolution of such problems for itself.

  • Response Times Qubit bases its response times and the actions it takes to resolve problems on an assessment of the impact of the reported technical issue. The more serious the impact, the higher the assigned priority. For all support issues relating to Customer, Qubit will respond in accordance with Table 1: P1 1 hour 4 hours P2 1 hour 8 hours P3 4 hours 72 hours P4 1 business day Next or a later major release **The Priority Levels are defined in Section II(2) below.

  • Optional Xactimate Response Attachment (Part 2)

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Customer Responsibility You agree that you are responsible for all access to and use of the Service through your account or password(s) and for any fees incurred for the Service, or for software or other merchandise purchased through the Service, or any other expenses incurred in accordance with the terms of this Agreement. You agree that you are responsible for backing up (a) any data you submit, receive or transfer over the Service, including, without limitation, your email; and (b) any data, files, programs, or applications on any device you connect to the Service. You acknowledge that you are aware that content accessible on or through the Service may contain material that is unsuitable for minors (persons under 18 years of age). You agree to supervise usage of your account by minors. You ratify and confirm any obligations incurred by a minor using your account.

  • Customer Support and Training System Agency will provide support for the CMBHS, including problem tracking and problem resolution. System Agency will provide telephone numbers for Grantees to obtain access to expert assistance for CMBHS-related problem resolution. System Agency will provide initial CMBHS training. Grantee shall provide subsequent ongoing end-user training.

  • Verizon Operations Support Systems Verizon systems for pre- ordering, ordering, provisioning, maintenance and repair, and billing.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!