IT SOLUTIONS Sample Clauses

IT SOLUTIONS. 2.1 This Contract governs the overall relationship of the SERVICE PROVIDER and the CUSTOMER with respect to the provision of the Ordered IT Solutions. The CUSTOMER has ordered the Ordered IT Solutions specified in Schedule 2-2 and the SERVICE PROVIDER shall provide those Ordered IT Solutions:
AutoNDA by SimpleDocs
IT SOLUTIONS. 3.1. Each of the IT Solutions specified in Schedule 3 of this Framework Agreement shall be subject to ITPS Approval. IT Solutions that are approved will be shown as a Catalogue Entry and shall be made available to Customers. When a specific IT Solution is the subject of an Order by a Customer, it will be referred to in the ensuing Contract as an Ordered IT Solution. The SERVICE PROVIDER must provide the Sprint II Website for Customers to place Orders for IT Solutions. Such Sprint II Website must allow Customers to complete the information set out in Annex A of Schedule 6. The SERVICE PROVIDER must also permit Customers to place Orders for IT Solutions via their own internal purchasing system.
IT SOLUTIONS. At present ICBS provides microdata to researchers using three different IT solutions depending on the type of data. Research rooms – for ’research room files’ and currently also for ‘MUC’ files ICBS have research rooms located in Jerusalem, Tel Aviv, Haifa and the Bank of Israel. In Jerusalem there are 10 standalone Windows 7 computers placed in the library that provide access to data for researchers. A researcher is assigned to one of the computers, and the data is copied to the computer and placed in a designated folder. The computers are backed up once a week. Researchers can receive output results by placing the files in a specified folder on the computer, and request ICBS to send the data. In both Tel Aviv and Haifa there are two computers in designated research rooms. The solution is much like Jerusalem, but the data is stored on removable discs encrypted with Microsoft bit locker. The removable discs are disconnected from the computer and stored in a safe place after work hours. Bank of Israel - for ‘research room’ files and currently also for ‘MUC’ files In the Bank of Israel there is a remote access research room with two computers. The room itself is protected by a smart card on the door and security cameras in the physical room. Researchers are identified by fingerprint, smartcards and a password before having access to servers and data located inside ICBS. The communication is protected by encryption in a site to site VPN connection on a leased line. Furthermore, firewalls, IDS/IPS and log monitoring systems are protecting the communication line.
IT SOLUTIONS 

Related to IT SOLUTIONS

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Verizon Operations Support Systems Verizon systems for pre- ordering, ordering, provisioning, maintenance and repair, and billing.

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Disaster Recovery and Business Continuity The Parties shall comply with the provisions of Schedule 5 (Disaster Recovery and Business Continuity).

  • IT Systems Except as would not, individually or in the aggregate, have a Material Adverse Effect, the Company reasonably believes that (i) the Company and the Subsidiaries own or have a valid right to access and use all computer systems, networks, hardware, software, databases, websites, and equipment used to process, store, maintain and operate data, information, and functions used in connection with the business of the Company and the Subsidiaries (the “Company IT Systems”), (ii) the Company IT Systems are adequate for, and operate and perform as required in connection with, the operation of the business of the Company and the Subsidiaries as currently conducted and (iii) the Company and the Subsidiaries have implemented reasonable backup, security and disaster recovery technology consistent with applicable regulatory standards;

  • Computer Systems (a) Servicer to operate systems The Servicer shall operate and maintain systems capable of providing data processing, management information and other related information technology requirements to enable it to carry out the Services.

  • Information and Services Required of the Owner § 3.1.1 The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.

  • ACCESS TO OPERATIONS SUPPORT SYSTEMS 2.1 BellSouth shall provide Cellutell Communications, Inc. access to operations support systems (“OSS”) functions for pre-ordering, ordering and provisioning, maintenance and repair, and billing. BellSouth shall provide access to the OSS through manual and/or electronic interfaces as described in this Attachment. It is the sole responsibility of Cellutell Communications, Inc. to obtain the technical Version R4Q01: 12/01/01 capability to access and utilize BellSouth’s OSS interfaces. Specifications for Cellutell Communications, Inc.’s access and use of BellSouth’s electronic interfaces are set forth at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx and are incorporated herein by reference.

  • Information Sources The Custodian may rely upon information received from issuers of Investments or agents of such issuers, information received from Subcustodians and from other commercially reasonable sources such as commercial data bases and the like, but shall not be responsible for specific inaccuracies in such information, provided that the Custodian has relied upon such information in good faith, or for the failure of any commercially reasonable information provider.

  • Data Processing System, Program and Information (a) The Investment Company shall not, solely by virtue of this Agreement, obtain any rights, title and interest in and to the computer systems and programs, including all related documentation, employed by FTIS in connection with rendering services hereunder; provided however, that the records prepared, maintained and preserved by FTIS pursuant to this Agreement shall be the property of the Investment Company.

Time is Money Join Law Insider Premium to draft better contracts faster.