Security Systems and Medical Monitoring Devices Sample Clauses

Security Systems and Medical Monitoring Devices. You understand and acknowledge that WOW!’s VOIP Phone service: (i) does not support rotary-dial telephones, DSL on the same line or any features, calling functions or certain call types not specifically listed in WOW!’s product literature; and (ii) may not support or be compatible with certain medical monitoring devices or security systems. In order to maintain any necessary alarm or medical equipment monitoring functions, Customer may be required to maintain a telephone connection through a local exchange carrier. In the event that WOW! installs and configures WOW! Phone to operate with Customer's medical monitoring equipment or security system, Customer expressly acknowledges that: (x) Customer must, directly or with the assistance of the provider of its medical monitoring equipment or alarm monitoring services, test the functioning and compatibility of the equipment and/or alarm monitoring services with WOW! Phone; and (y) the Service has certain limitations as described herein that may affect the reliability and functionality of the medical monitoring equipment and security systems. Customer assumes all risk associated with the limitations of the Service. CUSTOMER HEREBY WAIVES ALL CLAIMS AGAINST THE WOW! ENTITIES FOR INTERFERENCE, DISRUPTION OR INCOMPATIBILITY BETWEEN THE WOW! EQUIPMENT AND SERVICE AND ANY OTHER SERVICE, SYSTEMS AND EQUIPMENT, AND AGREES THAT, TO THE MAXIMUM EXTENT ALLOW ED BY LAW, THE WOW! ENTITIES SHALL HAVE NO LIABILITY FOR ANY DAMAGES CAUSED, DIRECTLY OR INDIRECTLY, AS A RESULT OF THE DISRUPTION, FAILURE OR IMPROPER FUNCTIONING OF ANOTHER SERVICE, SYSTEM OR EQUIPMENT (INCLUDING A MEDICAL MONITORING DEVICE OR SECURITY OR ALARM MONITORING SYSTEM) THAT OPERATES WITH USE OF THE WOW! SERVICE.
AutoNDA by SimpleDocs

Related to Security Systems and Medical Monitoring Devices

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • System Monitoring to ensure safe and continuous operation, the Customer must monitor key services and resource use as recommended by Deswik, and provide Deswik with details of monitoring and any relevant alerts as needed. Services to be monitors include, without limitation, disk space, CPU usage, memory usage, database connectivity, and network utilization.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

  • Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.

Time is Money Join Law Insider Premium to draft better contracts faster.