Migration to Azure Security Center Sample Clauses

Migration to Azure Security Center. Customers who acquire Server SLs for Microsoft Defender Advanced Threat Protection for Servers, and later during the term of their coverage choose to cover the same Servers with Azure Security Center, will be eligible for a credit toward Azure Security Center. Table of Contents / Glossary / Index Microsoft Kaizala Pro
AutoNDA by SimpleDocs

Related to Migration to Azure Security Center

  • SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA. EXHIBIT E

  • Future Services The Consultant acknowledges each of the following with regard to performing future services for the City: • The Consultant’s performance of Work in an Approved Service Order may create an actual or appearance of a conflict of interest with regard to the Consultant performing or participating in the performance of some related future services, particularly when the Work in an Approved Service Order comprises one element or aspect of a multi- phase process or project; • Such an actual or appearance of a conflict of interest would be a ground for the City to disqualify the Consultant from performing or participating in the performance of such future services; and • The Consultant is solely responsible for considering what potential conflicts of interest, if any, performing Work in an Approved Service Order might have on its ability to obtain contracts to perform future services.

  • Acupuncture Services Benefits will be provided for Medically Necessary acupuncture services when provided by a provider licensed to perform such services.

  • Signature Section For the CONTRACTOR Name (Please print) Title Signature Date For the MICHIGAN DEPARTMENT OF COMMUNITY HEALTH Xxxx Xxxx, Deputy Director, Operations Administration Date Part II General Provisions

  • CONFIDENTIALITY AND NON-DISCLOSURE; SECURITY BREACH REPORTING 2.1 For purposes of this Contract, confidential information will not include information or material which (a) enters the public domain (other than as a result of a breach of this Contract); (b) was in the receiving party’s possession prior to its receipt from the disclosing party; (c) is independently developed by the receiving party without the use of confidential information; (d) is obtained by the receiving party from a third party under no obligation of confidentiality to the disclosing party; or (e) is not exempt from disclosure under applicable State law.

  • Use; Quality Control a. Neither party may alter the other party’s trademarks from the form provided and must comply with removal requests as to specific uses of its trademarks or logos.

  • Core Services The Company agrees to provide those Core Services to the Municipality as set forth in Schedule “A” and further agrees to the process contained in Schedule “A”.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Internet Banking service by means of which it is possible for the client to exercise various transactions posted by the Bank on the special web page of the bank xxx.xxxxxxxxx.xx (without visiting the Bank), according to the regulations established by the Bank;

  • RIGHT TO KNOW LAW a. The Pennsylvania Right-to-Know Law, 65 P.S. §§ 67.101-3104, (“RTKL”) applies to this Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.