Public Cloud Sample Clauses

Public Cloud. To the extent that Customer has ordered Public Cloud storage, the terms of Exhibit A, attached hereto, shall apply.
AutoNDA by SimpleDocs
Public Cloud. For Customers purchasing a Public Cloud service (“Public Cloud”), INAP will provide customer with self-service access to elastic compute and storage resources hosted on a multi-tenant computing and storage platform. Customer is responsible for all configuration and operational tasks associated with virtual machines running in the public cloud. INAP maintains the infrastructure to maintain availability necessary to provide services on demand for INAP’s public cloud.
Public Cloud. The Services are accessible through the public cloud. Sage People and its licensors make no representation or warranty that the Services are appropriate or available for use in jurisdictions not compatible with accessibility through the public cloud.
Public Cloud. The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. • Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds) Pricing Notes
Public Cloud. The Odigo Solution is hosted on servers controlled by Amazon Web Services Inc (‘AWS’).
Public Cloud. The Customer alone decides when and which encryption can be used in the interests of the order processing. The keys must be protected against authorised access. Access or use of the contents does not occur unless it is nec- xxxxxx in order to maintain or offer the service products, or is required to observe the laws or comply with a binding order of a government body.
Public Cloud. At some cloud providers the buildings are cared for and moni- tored by security staff and in the case of sensitive areas are also monitored with video. There exists an access authorisation concept that is based on both a lock system, partially with a proper key administration, as well as an electronic access control system. Admission to individual production areas and to the business area is restricted by means of an electronic access control sys- tem while using, for instance, magnetic cards. Visitors are only permitted admission to sensitive areas after advance registration. In the course of accreditation, the visitor receives an identification, e.g. a visitor ID, which labels him as a guest and which he must carry with him during his stay at the site. At some sites the handling of guests is defined by means of a guideline. Admission to the individual production areas is only permitted with the accompaniment of authorised staff.
AutoNDA by SimpleDocs
Public Cloud. Regulations exist for access to IT systems. These regulations (e.g. the password convention) requires among other things a minimum length and requirements for passwords (e.g. large and small case letters, numbers and special characters, maximum validity period, check for trivial passwords). The logging on and off of users on the IT systems are logged. The systems are to be locked or powered down when leaving the workplace. If this is forgotten, the workplace will lock auto- matically. In addition there exists an admission authorisation concept. In general, all authorisations are withdrawn and must be activated again. The admission authorisation concept is based on the principle of user roles and profiles. The granting of personal- ised authorisations occurs through the responsible depart- ment. Upon request, excerpts and summaries from the correspond- ing regulations can be made available.
Public Cloud. There exists an authorisation concept for access to the IT sys- tems. The objective is to provide a secure, well-structured and uni- form release and authorisation strategy on all IT systems. Ac- cesses occur according to the “least privilege” concept. Only authorised storage media is to be used. Employees of the cloud provider are subject to advanced restrictions and ap- proval requirements to store personal data of the Client on mo- bile data media or to process same outside the cloud provider's business premises or to access same from there. Access to the individual systems is controlled with special net- work authorisations and a client-based role concept (e.g. ad- ministrator, IT etc.). Access rights are documented accord- ingly. Access authorisations are withdrawn or deleted. The cloud provider informs his staff about all relevant pro- cesses and role concepts and describes the consequences of violating the corresponding specifications. Upon request, excerpts and summaries from the correspond- ing concepts can be made available.
Public Cloud. Based on the authorisation concept, measures such as direc- tories are set up on the systems that guarantee a strict sepa- ration of data and files from other clients. Customer access to instances that do not correspond to the access authorisations is effectively prevented. Test, productive and integration systems are operated sepa- rately from one another.
Time is Money Join Law Insider Premium to draft better contracts faster.