Data Redundancy Sample Clauses

Data Redundancy. Meya will use commercially reasonable efforts to provide at a minimum one (1) redundant data store for Customer Data, updated on a daily basis, during the period of the Term.
AutoNDA by SimpleDocs
Data Redundancy. Bonfire will use commercially reasonable efforts to provide at a minimum one (1) redundant data store for Customer Data, updated on a daily basis, during the period of the Term.

Related to Data Redundancy

  • Redundancy The company is, and will remain during the life of this Agreement, a participating employer in the Redundancy Payment Central Fund Ltd (Incolink) and all employees will be enrolled in the Fund and be entitled to redundancy benefits in accordance with the terms of the Deed. The company shall pay contributions on behalf of each employee into the Incolink Number 1 Fund on a weekly basis, as per the Trust Deed.

  • Data Retention The Company will hold and use the Data only as long as is necessary to implement, administer and manage the Grantee’s participation in the Plan, or as required to comply with legal or regulatory obligations, including under tax and security laws.

  • Data Reporting 1. Maintain and adhere to data system software and encrypted portable computer device updates, and interface capability requirements for each computer located within the facility, and as specified in the Contract and required by County.

  • Redundancy Pay A redundant employee other than a casual employee (as defined) will receive redundancy/severance payments, calculated as follows, in respect of all continuous service (as defined by this Agreement) with the company Period of continuous service with the company Redundancy/severance pay Less than one year 1.75 hours per completed week of service up to a maximum of 2.4 weeks 1 year or more but less than 2 years 2.4 weeks pay plus for all service in express of 1 year, 1.75 hours pay per completed week of service up to a maximum of 4.8 weeks pay 2 years or more but less than 3 years 4.8 weeks pay plus, for all service in excess of 2 years, 1.6 hours pay per completed week of service up to a maximum of 7 weeks pay. 3 years or more than but less than 4 years 7 weeks pay plus, for all service in excess of 3 years, 0.73 hours pay per completed week of service up to a maximum of 8 weeks pay 4 years or more 8 weeks pay

  • Unbundled Network Terminating Wire (UNTW) 2.8.3.1 UNTW is unshielded twisted copper wiring that is used to extend circuits from an intra-building network cable terminal or from a building entrance terminal to an individual End User’s point of demarcation. It is the final portion of the Loop that in multi-subscriber configurations represents the point at which the network branches out to serve individual subscribers.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • DATA REQUESTS Upon the written request of the District, the State Auditor’s Office, the Appraisal District, or the Comptroller during the term of this Agreement, the Applicant, the District or any other entity on behalf of the District shall provide the requesting party with all information reasonably necessary for the requesting party to determine whether the Applicant is in compliance with its rights, obligations or responsibilities, including, but not limited to, any employment obligations which may arise under this Agreement.

  • CONTRACTOR NAME CHANGE An amendment is required to change the Contractor's name as listed on this Agreement. Upon receipt of legal documentation of the name change the State will process the amendment. Payment of invoices presented with a new name cannot be paid prior to approval of said amendment.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Time is Money Join Law Insider Premium to draft better contracts faster.