Additional G-Cloud services 30.1 The Buyer may require the Supplier to provide Additional Services. The Buyer doesn’t have to buy any Additional Services from the Supplier and can buy services that are the same as or similar to the Additional Services from any third party. 30.2 If reasonably requested to do so by the Buyer in the Order Form, the Supplier must provide and monitor performance of the Additional Services using an Implementation Plan.
Guarantee The Guarantor irrevocably and unconditionally agrees to pay in full to the Holders the Guarantee Payments (without duplication of amounts theretofore paid by the Issuer), as and when due, regardless of any defense, right of set-off or counterclaim that the Issuer may have or assert. The Guarantor's obligation to make a Guarantee Payment may be satisfied by direct payment of the required amounts by the Guarantor to the Holders or by causing the Issuer to pay such amounts to the Holders.
Introduction The Texas Health and Human Services Commission ("HHSC") and the Contractor named in Section I (HHSC and Contractor may be referenced in this document collectively as the “Parties” and individually as the “Party") hereby enter into this Community Services Contract - Provider Agreement (the “Contract”) for the provision of services under the Contract type specified in Section I for the considerations set forth herein. The Contract Begin Date specified in Section I is not valid until this Contract is signed by both parties.
Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who ▇▇▇ may contact if there are any data security concerns or questions.
RECITALS The above recitals are true and correct and are incorporated herein, in their entirety, by this reference.