Early Access Technologies Sample Clauses

Early Access Technologies. While under no obligation to do so, Oracle may make Early Access Technologies available from time to time. If it does, Oracle reserves the right to withdraw Early Access Technologies from testing or disable the Early Access Technologies at any time in its sole discretion and never release it as a commercial product. Early Access Technologies may not be feature complete or compatible with prior or future versions of the SuiteCloud Technologies or Service. Developer, and to the extent applicable, User, may choose to use such Early Access Technologies (and Developed Property made available through use of Early Access Technologies) in its sole discretion and at its own risk, in which case it agrees (i) to adhere to any restrictions or limitations in related documentation or otherwise identified by Oracle, (ii) not to use such Early Access Technologies in a production environment, (iii) not to make available any Developed Property containing, accessing or created using Early Access Technologies to a User unless otherwise expressly authorized or permitted by Oracle, (iv) to make use of the then-current available versions, features, or functionality of the SuiteCloud Technologies or Service if and when made available by Oracle and cease use of the associated prior versions of the same, (v) to cease use of the Early Access Technologies immediately upon the earliest of notice from Oracle, the conclusion of any testing period specified by Oracle, and Oracle’s removal or deactivation of the Early Access Technologies. Notwithstanding subsection (ii) and (iii) of this Section 4(f), if an Early Access Technology is identified as “beta,” Developer, and to the extent applicable, User, may use such technology in a production environment and make Developed Property created through use of such technology available to Users unless otherwise expressly restricted or limited by Oracle. Oracle (either directly or through third party providers) may review and monitor the performance of the Early Access Technologies. Developer’s feedback and all other communications related to the Early Access Technologies will be Communications. Developer will promptly report to Oracle any defects, errors or other problems in the Early Access Technologies. If Oracle designates a point of contact, all such reporting should be provided to such contact.
AutoNDA by SimpleDocs
Early Access Technologies. While under no obligation to do so, NetSuite may make Early Access Technologies available from time to time. If it does, NetSuite reserves the right to withdraw Early Access Technologies from testing or disable the Early Access Technologies at any time in its sole discretion and never release it as a commercial product. Early Access Technologies may not be feature complete or compatible with prior or future versions of the SuiteCloud Technologies or Service. Developer, and to the extent applicable, User, may choose to use such Early Access Technologies (and Developed Property made available through use of Early Access Technologies) in its sole discretion and at its own risk, in which case it agrees (i) to adhere to any restrictions or limitations in related documentation or otherwise identified by NetSuite, (ii) not to use such Early Access Technologies in a production environment, (iii) not to make available any Developed Property containing, accessing or created using Early Access Technologies to a User unless otherwise expressly authorized or permitted by NetSuite, (iv) to make use of the then-current available versions, features, or functionality of the SuiteCloud Technologies or Service if and when made available by NetSuite and cease use of the associated prior versions of the same,

Related to Early Access Technologies

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • School Improvement Plan As permitted under IC § 20-10.2-3-1.5, the Charter shall serve as the Charter School's strategic and continuous school improvement and achievement plan (hereafter, the "School Improvement Plan"). To the extent that IC § 20-10.2 applies to the Charter in its function as the School Improvement Plan, the Organizer shall comply with the requirements under IC § 20-10.2.

  • School Improvement Plans The School shall develop and implement a School Improvement Plan as required by section 1002.33(9)(n), Florida Statutes and applicable State Board of Education Rules or applicable federal law.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • FOREIGN ACCESS TO TECHNOLOGY This Article shall remain in effect during the term of the Agreement and for (INSERT NUMBER OF YEARS) ( ) years thereafter.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

Time is Money Join Law Insider Premium to draft better contracts faster.