{"component": "clause", "props": {"groups": [{"samples": [{"hash": "guQt6oZxMgz", "uri": "/contracts/guQt6oZxMgz#hosted-environment", "label": "Professional Services", "score": 24.6741962433, "published": true}], "snippet": "Infor will provide the application hosting environment, including the hardware, equipment, and systems software configuration on which Infor supports use of the Subscription Software and Subscription Services, on servers located at a facility selected by Infor. Facility selected by Infor must meet or exceed the requirements contained within the Service Level Description and elsewhere in this Agreement.", "snippet_links": [{"key": "hosting-environment", "type": "clause", "offset": [35, 54]}, {"key": "software-configuration", "type": "clause", "offset": [103, 125]}, {"key": "software-and-subscription-services", "type": "clause", "offset": [174, 208]}, {"key": "a-facility", "type": "definition", "offset": [232, 242]}, {"key": "the-requirements", "type": "clause", "offset": [309, 325]}, {"key": "service-level-description", "type": "definition", "offset": [347, 372]}, {"key": "in-this-agreement", "type": "clause", "offset": [387, 404]}], "size": 3, "hash": "7f97f7b58ddabd8d5a108c48ffcb7182", "id": 2}, {"samples": [{"hash": "dc9KOhBt7Ur", "uri": "/contracts/dc9KOhBt7Ur#hosted-environment", "label": "Master Agreement", "score": 33.9258499146, "published": true}, {"hash": "fBgrQjQNpmI", "uri": "/contracts/fBgrQjQNpmI#hosted-environment", "label": "Master Agreement", "score": 32.5078926086, "published": true}, {"hash": "kAKE3ubsAbv", "uri": "/contracts/kAKE3ubsAbv#hosted-environment", "label": "Master Agreement", "score": 32.4394607544, "published": true}], "snippet": "Verint or its third party\u2019s technical environment required to operate and provide access to the relevant Verint service.", "snippet_links": [{"key": "third-party", "type": "clause", "offset": [14, 25]}, {"key": "technical-environment", "type": "clause", "offset": [28, 49]}, {"key": "to-operate", "type": "definition", "offset": [59, 69]}, {"key": "the-relevant", "type": "clause", "offset": [92, 104]}], "size": 10, "hash": "744371a6f61802c8816a12589a97f551", "id": 1}, {"samples": [{"hash": "cO2rYAJm2lK", "uri": "/contracts/cO2rYAJm2lK#hosted-environment", "label": "Master Subscription Agreement", "score": 32.1438217163, "published": true}, {"hash": "18jl2V3mYO1", "uri": "/contracts/18jl2V3mYO1#hosted-environment", "label": "Master Subscription Agreement", "score": 32.1246604919, "published": true}], "snippet": "The Cloud Products are hosted by Amazon Web Services (AWS). Within the hosted environment, Customer is provided with its own application environment (your Galvanize service). AWS provides the physical facility and physical infrastructure of server hardware, networking and related services for the Cloud Products and the hosting of Customer Data.", "snippet_links": [{"key": "cloud-products", "type": "definition", "offset": [4, 18]}, {"key": "amazon-web-services", "type": "clause", "offset": [33, 52]}, {"key": "application-environment", "type": "clause", "offset": [125, 148]}, {"key": "physical-facility", "type": "definition", "offset": [192, 209]}, {"key": "physical-infrastructure", "type": "clause", "offset": [214, 237]}, {"key": "server-hardware", "type": "clause", "offset": [241, 256]}, {"key": "services-for", "type": "clause", "offset": [281, 293]}, {"key": "hosting-of-customer-data", "type": "clause", "offset": [321, 345]}], "size": 2, "hash": "dd0978a58ca65e388a9286638cf381c7", "id": 3}, {"samples": [{"hash": "51X24Wf4cN0", "uri": "/contracts/51X24Wf4cN0#hosted-environment", "label": "Subscription License and Services Agreement (AppTech Corp.)", "score": 30.132101059, "published": true}, {"hash": "60IqFYBcN2L", "uri": "/contracts/60IqFYBcN2L#hosted-environment", "label": "Subscription License and Services Agreement (AppTech Corp.)", "score": 29.7652301788, "published": true}], "snippet": "NECP will provide the application hosting environment, including the hardware, equipment, and systems software configuration and or public cloud computing services, on which NECP supports use of the Subscription Software and Subscription Services, on servers located at a facility selected by NECP and provided by NECP\u2019s hosting partner as specified in the Order Form.", "snippet_links": [{"key": "hosting-environment", "type": "clause", "offset": [34, 53]}, {"key": "software-configuration", "type": "clause", "offset": [102, 124]}, {"key": "cloud-computing-services", "type": "definition", "offset": [139, 163]}, {"key": "software-and-subscription-services", "type": "clause", "offset": [212, 246]}, {"key": "a-facility", "type": "definition", "offset": [270, 280]}, {"key": "hosting-partner", "type": "definition", "offset": [321, 336]}, {"key": "as-specified", "type": "clause", "offset": [337, 349]}, {"key": "order-form", "type": "definition", "offset": [357, 367]}], "size": 2, "hash": "bbc02f3fd2d6758507d5a5c8a0f86e1d", "id": 4}, {"samples": [{"hash": "fKYh4llR7mw", "uri": "/contracts/fKYh4llR7mw#hosted-environment", "label": "End User License Agreement", "score": 30.8692264557, "published": true}, {"hash": "aOV96VwT9u4", "uri": "/contracts/aOV96VwT9u4#hosted-environment", "label": "Master Saas Agreement", "score": 30.1848831177, "published": true}], "snippet": "Axis Security or its third party\u2019s technical environment required to operate and provide access to the relevant SaaS Services, as further specified in Section 5.2.", "snippet_links": [{"key": "third-party", "type": "clause", "offset": [21, 32]}, {"key": "technical-environment", "type": "clause", "offset": [35, 56]}, {"key": "to-operate", "type": "definition", "offset": [66, 76]}, {"key": "the-relevant", "type": "clause", "offset": [99, 111]}, {"key": "saas-services", "type": "definition", "offset": [112, 125]}, {"key": "section-52", "type": "clause", "offset": [151, 162]}], "size": 2, "hash": "113caa9d3db7c51ba816fb00c6d5c045", "id": 5}, {"samples": [{"hash": "ddB8fpii5bR", "uri": "/contracts/ddB8fpii5bR#hosted-environment", "label": "Master Agreement", "score": 25.4859676361, "published": true}, {"hash": "3jKN9bvkjtF", "uri": "/contracts/3jKN9bvkjtF#hosted-environment", "label": "Master Agreement", "score": 25.4640655518, "published": true}], "snippet": "Noname Security or its third party\u2019s technical environment required to operate and provide access to the relevant SaaS Services, as further specified in Section 3.2", "snippet_links": [{"key": "third-party", "type": "clause", "offset": [23, 34]}, {"key": "technical-environment", "type": "clause", "offset": [37, 58]}, {"key": "to-operate", "type": "definition", "offset": [68, 78]}, {"key": "the-relevant", "type": "clause", "offset": [101, 113]}, {"key": "saas-services", "type": "definition", "offset": [114, 127]}, {"key": "section-32", "type": "definition", "offset": [153, 164]}], "size": 2, "hash": "ea63266580684999e9deb9b514f1de00", "id": 6}, {"samples": [{"hash": "iDqa1qAJDQn", "uri": "/contracts/iDqa1qAJDQn#hosted-environment", "label": "Master Saas Agreement", "score": 22.6242294312, "published": true}], "snippet": "Verint or its third party\u2019s technical environment required to operate and provide access to the relevant SaaS Services, as further specified in Section 4.2 of Schedule B.", "snippet_links": [{"key": "third-party", "type": "clause", "offset": [14, 25]}, {"key": "technical-environment", "type": "clause", "offset": [28, 49]}, {"key": "to-operate", "type": "definition", "offset": [59, 69]}, {"key": "the-relevant", "type": "clause", "offset": [92, 104]}, {"key": "saas-services", "type": "definition", "offset": [105, 118]}, {"key": "section-42", "type": "clause", "offset": [144, 155]}], "size": 2, "hash": "bf539e144cc34689dd3290db0c824af2", "id": 7}, {"samples": [{"hash": "5oYeCEuaUi1", "uri": "/contracts/5oYeCEuaUi1#hosted-environment", "label": "Master Software License Agreement", "score": 35.4874300524, "published": true}], "snippet": "As an alternative to installing Server Software on Licensee-owned computers, Licensee may install and use the Server Software in a hosted environment, per the restrictions set forth in Section 2.2(a). In such event, Licensee shall be responsible for ensuring that the Software is only used for Licensee. Licensee is solely responsible for the relationship with a provider of a hosted environment.", "snippet_links": [{"key": "server-software", "type": "clause", "offset": [32, 47]}, {"key": "licensee-may", "type": "clause", "offset": [77, 89]}, {"key": "the-restrictions", "type": "clause", "offset": [155, 171]}, {"key": "licensee-shall", "type": "clause", "offset": [216, 230]}, {"key": "responsible-for", "type": "clause", "offset": [234, 249]}, {"key": "the-software", "type": "definition", "offset": [264, 276]}, {"key": "for-licensee", "type": "definition", "offset": [290, 302]}, {"key": "the-relationship", "type": "clause", "offset": [339, 355]}], "size": 1, "hash": "f11b9609e7e18a2a80ce2cc327bc6721", "id": 8}, {"samples": [{"hash": "huzzUcQJTfE", "uri": "/contracts/huzzUcQJTfE#hosted-environment", "label": "Software as a Service Agreement", "score": 32.5316696167, "published": true}], "snippet": "Hexagon will provide the application hosting environment, including the hardware, equipment, and systems software configuration on which Hexagon supports use of the Subscription Software and Subscription Services, on servers located at facilities selected by Hexagon. Customer is not permitted to access the Subscription Software on any environment outside the hosted environments selected by Hexagon as part of the Subscription Services.", "snippet_links": [{"key": "hosting-environment", "type": "clause", "offset": [37, 56]}, {"key": "software-configuration", "type": "clause", "offset": [105, 127]}, {"key": "software-and-subscription-services", "type": "clause", "offset": [178, 212]}, {"key": "not-permitted", "type": "clause", "offset": [280, 293]}], "size": 1, "hash": "3179fc4bc7caa7c256ed618ea74e9e61", "id": 9}, {"samples": [{"hash": "8UsyQiDItlw", "uri": "/contracts/8UsyQiDItlw#hosted-environment", "label": "End Customer Terms", "score": 26.6136875153, "published": true}], "snippet": "(a) Data. Customer may store data on the systems to which it is provided access in connection with its use of the Service (the \u201cHosted Environment\u201d). Dell may periodically make back-up copies of Customer data, however such back-ups are not intended to replace Customer\u2019s obligation to maintain regular data backups or redundant data archives. Customer is solely responsible for collecting, inputting and updating all Customer data stored in the Hosted Environment, and for ensuring that it does not (i) knowingly create and store data that actually or potentially infringes or misappropriates the copyright, trade secret, trademark or other intellectual property right of any third party, or (ii) use the Hosted environment for purposes that would reasonably be seen as obscene, defamatory, harassing, offensive or malicious. If the Order states where Customer data is to be stored, Dell will not move the data from the specified region without notifying Customer, except if Dell is required to do so by law or legal process. Dell shall have the right to delete all Customer data stored in connection with the use of the Service thirty (30) days following any termination of this Agreement or any license to Software granted hereunder. Customer represents and warrants that it has obtained all rights, permissions and consents necessary to use and transfer all Customer and/or third party data within and outside of the country in which Customer or the applicable Customer Affiliate is located (including providing adequate disclosures and obtaining legally sufficient consents from Customer\u2019s employees, customers, agents, and contractors). If Customer transmits data to a third-party website or other provider that is linked to or made accessible by the Service pr Software, Customer will be deemed to have given its consent to Dell enabling such transmission and Dell shall have no liability to Customer in connection with any claims by a third party in connection with such transmission.\n(b) Conduct. In connection with the use of the Hosted Environment and the Service, Customer may not (i) attempt to use or gain unauthorized access to Dell\u2019s or to any third-party's networks or equipment; (ii) permit other individuals or entities to copy the Software; (iii) provide unauthorized access to or use of any Software or the associated access credentials; (iv) attempt to probe, scan or test the vulnerability of the Software, the Hosted Environment, or a system, account or network of Dell or any of Dell\u2019s customers or suppliers;", "snippet_links": [{"key": "customer-may", "type": "clause", "offset": [10, 22]}, {"key": "store-data", "type": "definition", "offset": [23, 33]}, {"key": "the-systems", "type": "clause", "offset": [37, 48]}, {"key": "in-connection-with", "type": "clause", "offset": [80, 98]}, {"key": "use-of-the-service", "type": "clause", "offset": [103, 121]}, {"key": "customer-data", "type": "definition", "offset": [195, 208]}, {"key": "obligation-to-maintain", "type": "clause", "offset": [271, 293]}, {"key": "data-backups", "type": "clause", "offset": [302, 314]}, {"key": "responsible-for", "type": "clause", "offset": [362, 377]}, {"key": "trade-secret", "type": "definition", "offset": [608, 620]}, {"key": "right-of", "type": "clause", "offset": [663, 671]}, {"key": "for-purposes", "type": "definition", "offset": [724, 736]}, {"key": "if-the-order", "type": "clause", "offset": [826, 838]}, {"key": "the-data", "type": "clause", "offset": [902, 910]}, {"key": "specified-region", "type": "definition", "offset": [920, 936]}, {"key": "legal-process", "type": "clause", "offset": [1011, 1024]}, {"key": "right-to-delete", "type": "definition", "offset": [1046, 1061]}, {"key": "agreement-or", "type": "definition", "offset": [1180, 1192]}, {"key": "license-to-software", "type": "clause", "offset": [1197, 1216]}, {"key": "represents-and-warrants-that-it", "type": "clause", "offset": [1245, 1276]}, {"key": "all-rights", "type": "clause", "offset": [1290, 1300]}, {"key": "permissions-and-consents", "type": "clause", "offset": [1302, 1326]}, {"key": "third-party-data", "type": "clause", "offset": [1377, 1393]}, {"key": "the-country", "type": "definition", "offset": [1416, 1427]}, {"key": "customer-affiliate", "type": "definition", "offset": [1464, 1482]}, {"key": "legally-sufficient", "type": "definition", "offset": [1550, 1568]}, {"key": "from-customer", "type": "clause", "offset": [1578, 1591]}, {"key": "other-provider", "type": "clause", "offset": [1697, 1711]}, {"key": "customer-will", "type": "clause", "offset": [1777, 1790]}, {"key": "consent-to", "type": "clause", "offset": [1819, 1829]}, {"key": "no-liability", "type": "definition", "offset": [1882, 1894]}, {"key": "to-customer", "type": "clause", "offset": [1895, 1906]}, {"key": "by-a-third-party", "type": "clause", "offset": [1937, 1953]}, {"key": "access-to", "type": "definition", "offset": [2132, 2141]}, {"key": "other-individuals", "type": "clause", "offset": [2208, 2225]}, {"key": "the-software", "type": "definition", "offset": [2246, 2258]}, {"key": "access-credentials", "type": "clause", "offset": [2338, 2356]}], "size": 1, "hash": "75969ff5f4a2368ef5ddbfb6f3ffecfb", "id": 10}], "next_curs": "ClsSVWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjcLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ihtob3N0ZWQtZW52aXJvbm1lbnQjMDAwMDAwMGEMogECZW4YACAA", "clause": {"children": [["suspension", "Suspension"], ["data-storage-provider-location-and-description", "Data Storage Provider Location and Description"], ["environmental-controls", "Environmental Controls"], ["fire-suppression", "Fire Suppression"], ["power-supply", "Power Supply"]], "title": "Hosted Environment", "size": 33, "parents": [["subscription-services", "Subscription Services"], ["general", "General"], ["language", "Language"], ["exclusions", "Exclusions"], ["security-measures", "Security Measures"]], "id": "hosted-environment", "related": [["work-environment", "Work Environment", "Work Environment"], ["working-environment", "Working Environment", "Working Environment"], ["operating-environment", "Operating Environment", "Operating Environment"], ["non-sexist-environment", "NON-SEXIST ENVIRONMENT", "NON-SEXIST ENVIRONMENT"], ["environment", "Environment", "Environment"]], "related_snippets": [], "updated": "2025-07-17T06:09:22+00:00", "also_ask": ["What minimum security and uptime standards should be mandated in a Hosted Environment clause?", "How can liability for data breaches or outages be strategically allocated between parties?", "What are the most common enforceability challenges for Hosted Environment provisions in court?", "How do Hosted Environment obligations differ from traditional on-premises hosting in key jurisdictions?", "Which termination and transition rights are essential to mitigate vendor lock-in risks?"], "drafting_tip": "", "explanation": "The Hosted Environment clause defines the terms and conditions under which a service provider hosts software, data, or applications on behalf of a client. It typically outlines the responsibilities for maintaining the infrastructure, ensuring uptime, and providing access to the hosted resources, as well as any limitations or requirements for use. This clause is essential for clarifying the division of responsibilities between the provider and the client, ensuring both parties understand their obligations and reducing the risk of disputes related to service availability or data management."}, "json": true, "cursor": ""}}