To Datadog Sample Clauses

To Datadog. For all other notices or communications to Datadog, Customer may contact, as appropriate, (i) xxxxxxx@xxxxxxxxx.xxx (in connection with Sections 3 and 11.5), (ii) xxxxxxx@xxxxxxxxx.xxx (in connection with Section 5), (iii) any other e-mail address specifically identified in an applicable Section of the Agreement, or (iv) Customer’s Datadog Customer Success Manager via email (in connection with all other communications, including Sections 6.3 and 19).
AutoNDA by SimpleDocs

Related to To Datadog

  • Privacybeleid Apple beschermt je gegevens xx xxxxx tijde in overeenstemming met de richtlijnen van het privacybeleid van Apple. Je vindt deze richtlijnen op xxxxx://xxx.xxxxx.xxx/legal/privacy/.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • GetData BellSouth is authorized to provide, at a minimum, the account owner and/or Regional Accounting Office information on the lines of Express Connection indicating the local service provider and where billing records are to be sent for settlement purposes. This query service may be modified to provide additional information in the future.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • INFORMATION TECHNOLOGY The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Internet Safety X. Xxxxxxx and Users - Despite every effort for supervision and filtering, all Users and their parents/guardians are advised that access to the electronic Network may include the potential for access to materials inappropriate for school-aged students. Every User must take responsibility for his or her use of the Network and Internet and avoid these sites.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

Time is Money Join Law Insider Premium to draft better contracts faster.