Supported Responses Sample Clauses

Supported Responses. The following sections specify the default requirement for supporting SIP responses for all MSF compliant devices that support SIP, unless otherwise stated in the detailed SIP IAs.
AutoNDA by SimpleDocs

Related to Supported Responses

  • Line Item Question Response 43 Do your warranties cover all products, parts, and labor? Axon warrants that its law enforcement hardware products which are manufactured by Axon are free from defects in workmanship and materials for a period of one (1) year from the date of receipt. Axon-manufactured accessories are covered under a limited ninety-day warranty from the date of receipt. Non-Axon manufactured accessories are covered under the manufacturer's warranty. There are extended warranties available as defined in the Axon Master Services and Purchasing Agreement (MSPA). NON-AXON MANUFACTURED PRODUCTS For some solutions we are authorized resellers of hardware (Cradlepoint routers for Axon Fleet, Axis cameras for Axon Interview, etc.). Products that we are authorized to resell abide by the manufacturer's warranty. Further details can be provided upon request. * 44 Do your warranties impose usage restrictions or other limitations that adversely affect coverage? Restrictions are outlined in our warranty, which has been included in the uploaded attachments. * 45 Do your warranties cover the expense of technicians' travel time and mileage to perform warranty repairs? Our warranties do not cover the expense of technicians' travel time and mileage to perform warranty repairs. * 46 Are there any geographic regions of the United States (and Canada, if applicable) for which you cannot provide a certified technician to perform warranty repairs? How will Sourcewell Members in these regions be provided service for warranty repair? Axon will be available 24 hours/7 days per week by phone for emergency technical support for any system outage, and if mutually agreed upon by both parties, we can provide onsite support for local issues. If a site visit is deemed necessary due to an issue (i.e. access point failures or accidental cut wires) and not an Axon or Axon Evidence issue there may be a charge assessed to the agency. * 47 Will you cover warranty service for items made by other manufacturers that are part of your proposal, or are these warranties issues typically passed on to the original equipment manufacturer? Axon will troubleshoot these devices to the best of our ability. If we are unable to resolve the issue and the devices require warranty service, this will be performed by the manufacturer. * 48 What are your proposed exchange and return programs and policies? Axon does not allow exchanges or returns. Please see our MSPA for full details. * 49 Describe any service contract options for the items included in your proposal. Please refer to the included MSPA. * Table 10: Payment Terms and Financing Options Line Item Question Response * 50 What are your payment terms (e.g., net 10, net 30)? Payment terms are Net 30. * 51 Do you provide leasing or financing options, especially those options that schools and governmental entities may need to use in order to make certain acquisitions? Axon does not offer leasing or financing options. Alternatively, Axon offers a provision in its MSPA which allows for cancellation by the agency if sufficient funds are not appropriated. * 52 Briefly describe your proposed order process. Include enough detail to support your ability to report quarterly sales to Sourcewell as described in the Contract template. For example, indicate whether your dealer network is included in your response and whether each dealer (or some other entity) will process the Sourcewell Members' purchase orders. Axon will process orders Axon will accept from Sourcewell members directly, as our distributor network in the United States and Canada does not sell our video products. Our Order Entry team enters orders into our CRM, Salesforce. Reports will be maintained and extracted from Salesforce for quarterly reporting to Sourcewell. *

  • Supported Use Cases Subscription Services are provided for Red Hat Satellite Server, Red Hat Satellite Capsule and Red Hat Satellite Proxy Management Subscriptions only when used for their supported purposes (“Use Case”) in accordance with the terms of this Exhibit and Table 2 below.

  • Client Responsibilities You are responsible for (a) assessing each participants’ suitability for the Training, (b) enrollment in the appropriate course(s) and (c) your participants’ attendance at scheduled courses.

  • User Responsibilities i. Users are required to follow good security practices in the selection and use of passwords;

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Timely and Sustained Response Interconnection Customer shall ensure that the Small Generating Facility’s real power response to sustained frequency deviations outside of the deadband setting is automatically provided and shall begin immediately after frequency deviates outside of the deadband, and to the extent the Small Generating Facility has operating capability in the direction needed to correct the frequency deviation. Interconnection Customer shall not block or otherwise inhibit the ability of the governor or equivalent controls to respond and shall ensure that the response is not inhibited, except under certain operational constraints including, but not limited to, ambient temperature limitations, physical energy limitations, outages of mechanical equipment, or regulatory requirements. The Small Generating Facility shall sustain the real power response at least until system frequency returns to a value within the deadband setting of the governor or equivalent controls. An Applicable Reliability Standard with equivalent or more stringent requirements shall supersede the above requirements.

  • Incident Response Operator shall have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of any portion of Data, including PII, and agrees to provide LEA, upon request, an executive summary of the written incident response plan.

  • Rationale/Justification The Cisco Certified Network Associate Security (CCNA® Security) certification represents industry acknowledgement of technical skill attainment of competencies in the IT Security program.

  • Provider Responsibilities The Private Child-Caring Facility (PCC) (a.k.a., Provider) must comply with the following requirements:

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!