Hosting Requirements Sample Clauses

Hosting Requirements. 1. The Licensor or its subcontractor shall supply all hosting equipment (hardware and software) required for the cloud services and performance of the software and services set forth in the Quote and Statement of Work.
AutoNDA by SimpleDocs
Hosting Requirements a. Where Lattice handles Customer Data, servers shall be protected from unauthorized access with appropriate physical security mechanisms including, but not limited to, badge access control, secure perimeter, and enforced user provisioning controls (i.e. appropriate authorization of new accounts, timely account terminations and frequent user account reviews). These physical security mechanisms are provided by data center partners such as, but not limited to, AWS, Salesforce and Google. All cloud-hosted systems shall be scanned, where applicable and where approved by the cloud service provider.
Hosting Requirements. Supplier will provide and maintain all facilities for hosting the ASP Solution, including: physical premises, server(s), database server(s), firewall(s), Internet connectivity and any other facilities required to support the Order Gateway and Order Manager. Supplier shall provide sufficient hardware, software and equipment to meet applicable service levels defined in an applicable Order for the ASP Solution.
Hosting Requirements. The Licensor or its subcontractor shall supply all hosting equipment (hardware and software) required for the cloud services and performance of the software and services set forth in the Quote and Statement of Work. The Licensor shall provide secure access to applicable levels of users via the internet. The Licensor shall use commercially reasonable resources and efforts to maintain adequate internet connection bandwidth and server capacity. The Licensor or its subcontractors shall maintain all hosting equipment (hardware and software) and replace as necessary to maintain compliance with the Service Level Agreements. The Licensor shall monitor, prevent and deter unauthorized system access. Any and all known attempts must be reported to the Agency within forty-eight hours. In the event of any impermissible disclosure unauthorized loss or destruction of Confidential Information, the receiving Party must immediately notify the disclosing Party and take all reasonable steps to mitigate any potential harm or further disclosure of such Confidential Information. In addition, pertaining to the unauthorized access, use, release, or disclosure of data, the Licensor shall comply with state and federal data breach notification statutes and regulations, and shall report security incidents to the Agency within one (1) hour of when the Licensor has reasonable confirmation of such unauthorized access, use, release, or disclosure of data. The Licensor or the Licensor’s subcontractor shall allow the Agency or its delegate, at times chosen by the Agency, and within at least three (3) business days’ notice, to review the hosted system’s data center locations and security architecture. The Licensor’s employees or subcontractors, who are directly responsible for day-to-day monitoring and maintenance of the hosted system, shall have industry standard certifications applicable to the environment and system architecture used. The Licensor or the Licensor’s subcontractor shall locate servers in a climate-controlled environment. The Licensor or the Licensor’s contractor shall house all servers and equipment in an operational environment that meets industry standards including climate control, fire and security hazard detection, electrical needs, and physical security. The Licensor shall examine applicable system and error logs daily to minimize and predict system problems and initiate appropriate action. The Licensor shall completely test and apply patches for all third-party softwa...
Hosting Requirements a. Where Ditat handles Client Data, servers shall be protected from unauthorized access with appropriate physical security mechanisms including, but not limited to, badge access control, secure perimeter, and enforced user provisioning controls (i.e. appropriate authorization of new accounts, timely account terminations and frequent user account reviews). These physical security mechanisms are provided by data center partners such as, but not limited to, AWS, Salesforce and Google.
Hosting Requirements. EA will host the RMCF Marketplace with (i) uptime, (ii) response time, (iii) availability, and (iv) performance of its customer-facing services, (such as credit card processing times, customer inquiry response and resolution times) commensurate in all material respects with EA’s Edible Arrangements marketplace.
Hosting Requirements a. Where Gainsight handles Client Data, servers shall be protected from unauthorized access with appropriate physical security mechanisms including, but not limited to, badge access control, secure perimeter, and enforced user provisioning controls (i.e. appropriate authorization of new accounts, timely account terminations and frequent user account reviews). These physical security mechanisms are provided by data center partners such as, but not limited to, AWS, Salesforce and Google.
AutoNDA by SimpleDocs
Hosting Requirements 

Related to Hosting Requirements

  • Posting Requirements Seller shall post the Development Security in accordance with the following terms and conditions:

  • Staffing Requirements Licensee will be in full compliance with the main studio staff requirements as specified by the FCC.

  • Forecasting Requirements 19.5.1 The Parties shall exchange technical descriptions and forecasts of their Interconnection and traffic requirements in sufficient detail necessary to establish the Interconnections necessary for traffic completion to and from all Customers in their respective designated service areas.

  • Operating Requirements Any operating and technical requirements that may be applicable due to Regional Transmission Organization, Independent System Operator, control area, or the Connecting Transmission Owner’s requirements, including those set forth in the Small Generator Interconnection Agreement. Operating Requirements shall include Applicable Reliability Standards.

  • Training Requirements Grantee shall:

  • Monitoring Requirements This Schedule sets out the contract management requirements which are applicable to the delivery of the Services.

  • Trunking Requirements 7.2.2.9.1 The Parties will provide designed Interconnection facilities that meet the same technical criteria and service standards, such as probability of blocking in peak hours and transmission standards, in accordance with current industry standards.

  • Reporting Requirements The Company, during the period when the Prospectus is required to be delivered under the 1933 Act or the 1934 Act, will file all documents required to be filed with the Commission pursuant to the 1934 Act within the time periods required by the 1934 Act and the 1934 Act Regulations.

  • Credentialing Requirements Registry Operator, through the facilitation of the CZDA Provider, will request each user to provide it with information sufficient to correctly identify and locate the user. Such user information will include, without limitation, company name, contact name, address, telephone number, facsimile number, email address and IP address.

Time is Money Join Law Insider Premium to draft better contracts faster.