Performance Security 47.1 Within twenty-one (21) days of the receipt of Letter of Acceptance from the Procuring Entity, the successful Tenderer, if required, shall furnish the Performance Security in accordance with the GCC 18, using for that purpose the Performance Security Form included in Section X, Contract Forms. If the Performance Security furnished by the successful Tenderer is in the form of a bond, it shall be issued by a bonding or insurance company that has been determined by the successful Tenderer to be acceptable to the Procuring Entity. A foreign institution providing a bond shall have a correspondent financial institution located in Kenya, unless the Procuring Entity has agreed in writing that a correspondent financial institution is not required. 47.2 Failure of the successful Tenderer to submit the above-mentioned Performance Security or sign the Contract shall constitute sufficient grounds for the annulment of the award and forfeiture of the Tender Security. In that event the Procuring Entity may award the Contract to the Tenderer offering the next lowest Evaluated Tender. 47.3 Performance security shall not be required for a contract, if so specified in the TDS.
Release of Performance Security (i) The Authority shall return the Performance Security to the Contractor within 60 (sixty) days of the expiry of the Maintenance Period or the Defects Liability Period, whichever is later, under this Agreement. Notwithstanding the aforesaid, the Parties agree that the Authority shall not be obliged to release the Performance Security until all Defects identified during the Defects Liability Period have been rectified. (ii) The Authority shall return the Additional Performance Security to the Contractor within 28 (twenty eight) days from the date of issue of Completion Certificate under Article 12 of this Agreement. (iii) The Authority shall be liable to pay interest @ 9% (nine per cent) per annum for any delay in the return of Performance Security and Additional Performance Security, if any, beyond the period prescribed above for the period of delay.
Appropriation of Performance Security (i) Upon occurrence of a Contractor’s Default, the Authority shall, without prejudice to its other rights and remedies hereunder or in law, be entitled to encash and appropriate the relevant amounts from the Performance Security as Damages for such Contractor’s Default. (ii) Upon such encashment and appropriation from the Performance Security, the Contractor shall, within 30 (thirty) days thereof, replenish, in case of partial appropriation, to its original level the Performance Security, and in case of appropriation of the entire Performance Security provide a fresh Performance Security, as the case may be, and the Contractor shall, within the time so granted, replenish or furnish fresh Performance Security as aforesaid failing which the Authority shall be entitled to terminate the Agreement in accordance with Article 23. Upon replenishment or furnishing of a fresh Performance Security, as the case may be, as aforesaid, the Contractor shall be entitled to an additional Cure Period of 30 (thirty) days for remedying the Contractor’s Default, and in the event of the Contractor not curing its default within such Cure Period, the Authority shall be entitled to encash and appropriate such Performance Security as Damages, and to terminate this Agreement in accordance with Article 23.
CONTRACTOR PERFORMANCE AUDIT The Contractor shall allow the Authorized User to assess Contractor’s performance by providing any materials requested in the Authorized User Agreement (e.g., page load times, response times, uptime, and fail over time). The Authorized User may perform this Contractor performance audit with a third party at its discretion, at the Authorized User’s expense. The Contractor shall perform an independent audit of its Data Centers, at least annually, at Contractor expense. The Contractor will provide a data owner facing audit report upon request by the Authorized User. The Contractor shall identify any confidential, trade secret, or proprietary information in accordance with Appendix B, Section 9(a), Confidential/Trade Secret Materials.
SYSTEM PERFORMANCE REQUIREMENTS Certain functions of the Platform are subject to the service level agreement described in the Agreement. The following additional terms apply to Electronic Communication Services (as defined below). Such terms control in the event of a conflict with the terms of the Agreement. 1. These terms apply only to NCR Voyix’s provision of electronic communication services, such as NCR Voyix Pulse Real Time Text Paging, certain NCR Voyix online ordering functionalities and NCR Voyix Consumer Marketing (collectively, “Communication Services”). The Communication Services may enable you to send communications to your patrons, end-users or other recipients (collectively, “Recipients”), including e-mails, text messages or other electronic messages (collectively, “Communications”). Communications may be routed through wireless or mobile carriers, internet service providers or other communication service providers (each, a “CSP”). 2. You are entirely responsible for your use of the Communication Services, including, but not limited to: (a) proper account setup and configuration settings; (b) obtaining consents or opt-ins from Recipients to receive Communications; (c) compliance with requests to opt-out or unsubscribe from Communications; (d) providing all required disclosures; and (e) use of valid phone numbers, e-mail addresses or other communications identifiers as appropriate for the particular type of Communication. You are responsible for compliance with (i) all laws, rules, regulations and ordinances (including, without limitation, the Telephone Consumer Protection Act, the Federal Trade Commission Act, and the CAN-SPAM Act) and (ii) all industry standards and CSP requirements and policies (including, without limitation, all “S.H.A.F.T” rules and similar standards), in each case, as applicable to your use of the Communication Services or the conduct of your business (collectively, “Applicable Legal Requirements”). You will not use the Communication Services in violation of Applicable Legal Requirements or to engage in any illegal or unethical activity. You are solely responsible for the content and accuracy of your Communications and any products or services offered for sale therein. You will not send any misleading, inaccurate, threatening, libelous, obscene, harassing, or offensive Communication. If NCR Voyix provides images or other materials as part of the Communication Services, you may only use them for your permitted use of the Communication Services. Further, you may not use any third-party or purchased e-mail list(s) in connection with the Communication Services. NCR Voyix may immediately suspend or terminate your use of the Communication Services if you breach any obligation under this Section. You agree to immediately report any violation of this Section to NCR Voyix and provide cooperation, as requested by NCR Voyix, to investigate and/or remedy that violation. You are responsible for any and all charges (including, but not limited to, fees associated with text or email messaging) imposed by your CSP. Message and data rates may apply. Such charges include those from your mobile carrier or other CSP. 3. Communications may not be encrypted, so you should use appropriate care when determining the content of any Communications. Delivery and receipt of Communications may be delayed or impacted by technical or other issues with CSPs or other third parties or due to other reasons outside of NCR Voyix’s control. NCR Voyix will not be liable for any losses or damages arising from the disclosure of any Communication to any third party or the non-delivery, delayed delivery, misdirected delivery or mishandling of, or inaccurate content in, any Communication sent via the Communication Services. 4. You will indemnify, defend and hold harmless NCR Voyix and its affiliates, suppliers, agents and representatives against any and all claims, losses, costs, fines, fees, liabilities or obligations arising from: (a) your use of the Communication Services or the conduct of your business; or (b) your violation of Applicable Legal Requirements. The indemnified parties hereunder are intended third-party beneficiaries of this Section.