Software verification Sample Clauses

Software verification. Customer will furnish Outcold Solutions with a certification signed by Customer’s authorized representative (delivered electronically or otherwise) verifying that the Software is being used in accordance with this Agreement and the applicable Order within seven (7) days of Outcold Solutions’ request.
AutoNDA by SimpleDocs
Software verification. The slot machine shall have the ability to permit an independent integrity check of the slot machine's software from an exterior source such as the removal and authentication by a third-party device, or by having an interface. port permitting a third-party device to authenticate the media. Such an integrity check shall provide a means for field testing the software to identify and validate the program.‌‌‌
Software verification. The Contractor shall verify that the contracted software performs the functions within the limitations/criteria of the design specifications.

Related to Software verification

  • Account Verification Whether or not a Default or Event of Default exists, Agent shall have the right at any time, in the name of Agent, any designee of Agent or any Borrower, to verify the validity, amount or any other matter relating to any Accounts of Borrowers by mail, telephone or otherwise. Borrowers shall cooperate fully with Agent in an effort to facilitate and promptly conclude any such verification process.

  • Inspection and Verification The Secured Parties and such persons as the Secured Parties may reasonably designate shall have the right to inspect the Collateral, all records related thereto (and to make extracts and copies from such records) and the premises upon which any of the Collateral is located, to discuss the Grantor’s affairs with the officers of the Grantor and its independent accountants and to verify under reasonable procedures the validity, amount, quality, quantity, value, condition and status of, or any other matter relating to, the Collateral, including, in the case of collateral in the possession of any third Person, by contacting any account debtor or third Person possessing such Collateral for the purpose of making such a verification. Out-of-pocket expenses in connection with any inspections by representatives of the Secured Parties shall be (a) the obligations of the Grantor with respect to any inspection after the Secured Parties’ demand payment of the Notes or (b) the obligation of the Secured Parties in any other case.

  • Validation To validate the notice requirements outlined in Section 5.3, the Assuming Institution shall provide the Receiver (i) an Affidavit of Publication to meet the publication requirements outlined in Section 5.3(a) and (ii) the Assuming Institution will prepare an Affidavit of Mailing in a form substantially similar to Exhibit 2.3B after mailing the seven (7) day Notice to Depositors as required under Section 5.3(b).

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • Verification Bank may, from time to time, verify directly with the respective Account Debtors the validity, amount and other matters relating to the Accounts, either in the name of Borrower or Bank or such other name as Bank may choose.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

Time is Money Join Law Insider Premium to draft better contracts faster.