System and Output Ownership Sample Clauses

System and Output Ownership. (a) Lessor acknowledges and agrees that (i) Lessee or one of its Affiliates is and shall be the exclusive owner and operator of the System, (ii) all equipment and facilities comprising the System shall remain the personal property of Lessee and shall not become fixtures, notwithstanding the manner in which the System is or may be mounted on, adhered to or attached to the Premises or structures, buildings and fixtures on the Premises, and (iii) Lessor shall have no right, title or interest in any System or any component thereof, notwithstanding that any such System may be mounted on, adhered to or attached to the Premises or structures, buildings and fixtures on the Premises.
AutoNDA by SimpleDocs
System and Output Ownership 

Related to System and Output Ownership

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Risk and Ownership C14.1 Subject to clause C13 above, risk in the Goods shall, without prejudice to any other rights or remedies of the Authority (including the Authority’s rights and remedies under clause C16 below) pass to the Authority when delivery is completed to the Authority’s reasonable satisfaction.

  • Equipment Ownership The ownership of all equipment provided by the Contractor shall remain with the Contractor, and equipment shall be maintained by the Contractor in accordance with manufacturer recommendations and all Federal (including OSHA), New York State and local codes. The Contractor shall provide and maintain the collection equipment at the Authorized User’s facility(s) for use twenty-four hours per day, seven days per week, 365 days per year. If equipment is removed for longer than brief periods for emptying the container, it shall be replaced with equal type and capacity equipment to ensure continuous dumping ability. If not so provided, the Authorized User shall be provided with a rebate for the amount of time they were unable to dump and the Authorized User may seek "Remedies for Breach" as stated in Appendix B. If the equipment is owned by the Authorized User, the Authorized User assumes liability and costs associated with the equipment and a price reduction may be passed along to the Authorized User representing the difference in cost, if any, for the Contractor not having to provide the equipment.

  • Customer Ownership Customer owns and has sole responsibility for the accuracy, quality, integrity, and appropriateness of all original data, content and information provided to Xxxxxx Xxxxxxx in conjunction with the Services, and, when paid for, Customer will own all modified content and information as specified under the SOW (collectively the “Content,” which, together with the Customer’s trademarks or logos, are referred to as the “Customer Material).”

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Joint ownership 10 Annuitant............................................................... 10

  • Interconnection 2.1.10 Startup Testing and Commissioning

  • Provisioning of High Frequency Spectrum and Splitter Space 3.2.1 BellSouth will provide <<customer_name>> with access to the High Frequency Spectrum as follows:

  • Local Control Center, Metering and Telemetry The NTO shall operate, pursuant to ISO Tariffs, ISO Procedures, Reliability Rules and all other applicable reliability rules, standards and criteria on a twenty-four (24) hour basis, a suitable local control center(s) with all equipment and facilities reasonably required for the ISO to exercise ISO Operational Control over NTO Transmission Facilities Under ISO Operational Control, and for the NTO to fulfill its responsibilities under this Agreement. Operation of the NYS Power System is a cooperative effort coordinated by the ISO control center in conjunction with local control centers and will require the exchange of all reasonably necessary information. The NTO shall provide the ISO with Supervisory Control and Data Acquisition (“SCADA”) information on facilities listed in Appendices A-1 and A-2 herein as well as on generation and merchant transmission resources interconnected to the NTO’s transmission facilities pursuant to the ISO OATT. The NTO shall provide metering data for its transmission facilities to the ISO, unless other parties are authorized by the appropriate regulatory authority to provide metering data. The NTO shall collect and submit to the ISO billing quality metering data and any other information for its transmission facilities required by the ISO for billing purposes. The NTO shall provide to the ISO the telemetry and other operating data from generation and merchant transmission resources interconnected to its transmission facilities that the ISO requires for the operation of the NYS Power System. The NTO will establish and maintain a strict code of conduct to prevent such information from reaching any unauthorized person or entity.

Time is Money Join Law Insider Premium to draft better contracts faster.