Use of Verizon Telecommunications Services 2.1 Verizon Telecommunications Services may be purchased by PNG under this Resale Attachment only for the purpose of resale by PNG as a Telecommunications Carrier. Verizon Telecommunications Services to be purchased by PNG for other purposes (including, but not limited to, PNG’s own use) must be purchased by PNG pursuant to other applicable Attachments to this Agreement (if any), or separate written agreements, including, but not limited to, applicable Verizon Tariffs. 2.2 PNG shall not resell: 2.2.1 Residential service to persons not eligible to subscribe to such service from Verizon (including, but not limited to, business or other nonresidential Customers); 2.2.2 Lifeline, Link Up America, or other means-tested service offerings, to persons not eligible to subscribe to such service offerings from Verizon; 2.2.3 Grandfathered or discontinued service offerings to persons not eligible to subscribe to such service offerings from Verizon; or 2.2.4 Any other Verizon service in violation of a restriction stated in this Agreement (including, but not limited to, a Verizon Tariff) that is not prohibited by Applicable Law. 2.2.5 In addition to any other actions taken by PNG to comply with this Section 2.2, PNG shall take those actions required by Applicable Law to determine the eligibility of PNG Customers to purchase a service, including, but not limited to, obtaining any proof or certification of eligibility to purchase Lifeline, Link Up America, or other means-tested services, required by Applicable Law. PNG shall indemnify Verizon from any Claims resulting from PNG’s failure to take such actions required by Applicable Law. 2.2.6 Verizon may perform audits to confirm PNG’s conformity to the provisions of this Section 2.2. Such audits may be performed twice per calendar year and shall be performed in accordance with Section 7 of the General Terms and Conditions. 2.3 PNG shall be subject to the same limitations that Verizon’s Customers are subject to with respect to any Telecommunications Service that Verizon grandfathers or discontinues offering. Without limiting the foregoing, except to the extent that Verizon follows a different practice for Verizon Customers in regard to a grandfathered Telecommunications Service, such grandfathered Telecommunications Service: (a) shall be available only to a Customer that already has such Telecommunications Service; (b) may not be moved to a new service location; and (c) will be furnished only to the extent that facilities continue to be available to provide such Telecommunications Service. 2.4 PNG shall not be eligible to participate in any Verizon plan or program under which Verizon Customers may obtain products or services, which are not Verizon Telecommunications Services, in return for trying, agreeing to purchase, purchasing, or using Verizon Telecommunications Services. 2.5 In accordance with 47 CFR § 51.617(b), Verizon shall be entitled to all charges for Verizon Exchange Access services used by interexchange carriers to provide service to PNG Customers.
Web Services Our Web Services are designed to enable you to easily establish a presence on the Internet. Our Web Hosting and Design is composed of our Web Hosting and Design Publishing Component and other miscellaneous components. These components may be used independently or in conjunction with each other.
Online Services Microsoft warrants that each Online Service will perform in accordance with the applicable SLA during Customer’s use. Customer’s remedies for breach of this warranty are described in the SLA.
Voice Services In lieu of any other rates and discounts, Customer will pay fixed per-minute rates ranging from $0.000 to $0.000 for the following Voice Services: Domestic Voice Service: Domestic Outbound Voice Service, including Calling Card and Domestic Inbound Voice Service based on origination and termination type. Data Services:
Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.
Verizon OSS Services Access to Verizon Operations Support Systems functions. The term “Verizon OSS Services” includes, but is not limited to: (a) Verizon’s provision of ECI Usage Information to ECI pursuant to Section 8.3 of this Attachment; and, (b) “Verizon OSS Information”, as defined in Section 8.1.4 of this Attachment.
ADS Services Up to U.S. $5.00 per 100 ADSs (or fraction thereof) held on the applicable record date(s) established by the Depositary. Person holding ADSs on the applicable record date(s) established by the Depositary.
SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.
Software Services If elected by Customer, the following Software Services will be made available for Customer’s use. 2.1. Core HR Software Service is a system of interactive web pages to assist Customer in its human resource related recordkeeping and reporting. Customer shall ensure the accuracy of its Customer Data. The HR Software Services shall function in accordance with the Documentation, as may be amended from time to time, and provide features to aid Customer with its compliance with federal and state laws and regulations applicable to Human Resources (except as stated otherwise in the Documentation). 2.2. Recruiting Software Service is a system of interactive web pages to assist Customer in posting job requisitions, storing candidates, recording job applications, and the related recordkeeping and reporting. Customer shall ensure the accuracy of its Customer Data. The Recruiting Software Service shall function in accordance with the Documentation which may be amended from time to time.
By Customer To the extent permitted by applicable law, Customer will defend Microsoft against any third-party claim to the extent it alleges that: (1) any Customer Data or non- Microsoft software hosted in an Online Service by Microsoft on Customer’s behalf misappropriates a trade secret or directly infringes a patent, copyright, trademark, or other proprietary right of a third party; or (2) Customer’s use of any Product or Fix, alone or in combination with anything else, violates the law or xxxxx a third party.