Software and Computing Systems Clause Samples

Software and Computing Systems. At its reasonable discretion, the City may prohibit the Contractor from the use of certain software programs, databases, and computing systems with known vulnerabilities to collect, use, process, store, or generate data and information, with Protected Information, received as a result of the Contractor’s services under this Agreement. The Contractor shall comply with all requirements, if any, associated with the use of software programs, databases, and computing systems as reasonably directed by the City. The Contractor shall not use funds paid by the City for the acquisition, operation, or maintenance of software in violation of any copyright laws or licensing restrictions. The Contractor shall maintain commercially reasonable network security that, at a minimum, includes network firewalls, intrusion detection/prevention, enhancements, or updates consistent with evolving industry standards, and periodic penetration testing.
Software and Computing Systems. At its reasonable discretion, the City may prohibit the Subrecipient from the use of certain software programs, databases, and computing systems with known vulnerabilities to collect, use, process, store, or generate data and information, with Protected Information, received as a result of the Subrecipient’s services under this Agreement. The Subrecipient shall fully comply with all requirements and conditions, if any, associated with the use of software programs, databases, and computing systems as reasonably directed by the City. The Subrecipient shall not use funds paid by the City for the acquisition, operation, or maintenance of software in violation of any copyright laws or licensing restrictions. The Subrecipient shall maintain commercially reasonable network security that, at a minimum, includes network firewalls, intrusion detection/prevention, enhancements, or updates consistent with evolving industry standards, and periodic penetration testing.
Software and Computing Systems. At its reasonable discretion, the City may prohibit Special Counsel from the use of certain software programs, databases, and computing systems with known vulnerabilities to collect, use, process, store, or generate data and information, with Protected Information, received as a result of Special Counsel’s services under this Agreement. Special Counsel shall fully comply with all requirements and conditions, if any, associated with the use of software programs, databases, and computing systems as reasonably directed by the City. Special Counsel shall not use funds paid by the City for the acquisition, operation, or maintenance of software in violation of any copyright laws or licensing restrictions. Special Counsel shall maintain commercially reasonable network security that, at a minimum, includes network firewalls, intrusion detection/prevention, enhancements or updates consistent with evolving industry standards, and periodic penetration testing.

Related to Software and Computing Systems

  • Software and Services Vendor warrants that for twelve (12) months following the acceptance of the total system, the Developed Software (and associated documentation) to be delivered to Customer hereunder shall be free from significant programming errors and from defects in workmanship) and materials; shall conform to the performance capabilities, characteristics, specifications, functions and other descriptions and standards applicable thereto as set forth in the Purchase Order or attachments; and that, in general, the services to be performed by Vendor shall be performed in a timely and professional manner by qualified technicians totally familiar with such Developed Software. In the event that defects are discovered during the warranty period, Vendor shall promptly remedy such defects at no additional expense to Customer.

  • Hardware and Software In order to use the Services, you must obtain and maintain, at your expense, compatible mobile hardware and software as specified by Credit Union from time to time. Credit Union is not responsible for any third party software you may need to use the Services. Any such software is accepted by you as is and is subject to the terms and conditions of the software agreement you enter into directly with the third party software provider at time of download and installation.

  • Interconnection Customer Compensation If the CAISO requests or directs the Interconnection Customer to provide a service pursuant to Articles 9.6.3 (Payment for Reactive Power) or 13.5.1 of this LGIA, the CAISO shall compensate the Interconnection Customer in accordance with the CAISO Tariff.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.