{"component": "clause", "props": {"groups": [{"samples": [{"hash": "lNhTY4MVDwK", "uri": "/contracts/lNhTY4MVDwK#system-control", "label": "Data Processing Agreement", "score": 27.3107460643, "published": true}, {"hash": "f2nMxMtFYSH", "uri": "/contracts/f2nMxMtFYSH#system-control", "label": "Data Processing Agreement", "score": 27.1629021218, "published": true}], "snippet_links": [{"key": "access-to-the-company", "type": "clause", "offset": [0, 21]}, {"key": "in-order-to-ensure", "type": "clause", "offset": [54, 72]}, {"key": "relevant-personnel", "type": "definition", "offset": [87, 105]}, {"key": "prior-approval", "type": "definition", "offset": [124, 138]}, {"key": "the-database", "type": "definition", "offset": [150, 162]}, {"key": "the-company-has", "type": "definition", "offset": [164, 179]}, {"key": "appropriate-safeguards", "type": "clause", "offset": [197, 219]}, {"key": "related-to", "type": "clause", "offset": [220, 230]}, {"key": "remote-access", "type": "definition", "offset": [231, 244]}, {"key": "access-or-use", "type": "clause", "offset": [341, 354]}, {"key": "in-accordance-with", "type": "definition", "offset": [377, 395]}, {"key": "to-the-extent", "type": "clause", "offset": [433, 446]}, {"key": "the-personal-data", "type": "definition", "offset": [521, 538]}, {"key": "gain-access", "type": "definition", "offset": [565, 576]}, {"key": "the-risk", "type": "definition", "offset": [697, 705]}, {"key": "authentication-measures", "type": "definition", "offset": [736, 759]}, {"key": "in-place", "type": "definition", "offset": [774, 782]}, {"key": "access-to-personal-data", "type": "clause", "offset": [807, 830]}, {"key": "employees-who", "type": "clause", "offset": [861, 874]}, {"key": "permission-to-access", "type": "clause", "offset": [891, 911]}, {"key": "specific-authorization", "type": "definition", "offset": [1024, 1046]}, {"key": "any-action", "type": "definition", "offset": [1116, 1126]}, {"key": "use-of-personal-data", "type": "clause", "offset": [1151, 1171]}, {"key": "user-name", "type": "definition", "offset": [1196, 1205]}, {"key": "when-applicable", "type": "clause", "offset": [1254, 1269]}, {"key": "able-to-perform", "type": "clause", "offset": [1288, 1303]}, {"key": "granted-to", "type": "definition", "offset": [1354, 1364]}, {"key": "by-the-company", "type": "clause", "offset": [1369, 1383]}, {"key": "ongoing-reviews", "type": "clause", "offset": [1419, 1434]}, {"key": "the-employees", "type": "clause", "offset": [1438, 1451]}, {"key": "upon-termination-of-employment", "type": "clause", "offset": [1625, 1655]}, {"key": "authorized-individuals", "type": "definition", "offset": [1657, 1679]}, {"key": "located-in", "type": "definition", "offset": [1719, 1729]}], "size": 3, "snippet": "Access to the Company\u2019s database is highly restricted in order to ensure that only the relevant personnel who have received prior approval can access the database. The Company has also implemented appropriate safeguards related to remote access and wireless computing capabilities. Employees are assigned private passwords that allow strict access or use to Personal Data, all in accordance with such employee\u2019s position, and solely to the extent such access or use is required. There is constant monitoring of access to the Personal Data and the passwords used to gain access. The Company is using automated tools to identify non-human login attempts and rate-limiting login attempts to minimize the risk of a brute force attack. User authentication measures have been put in place in order to ensure that access to Personal Data is restricted solely to those employees who have been given permission to access it and to ensure that the Personal Data is not accessed, modified, copied, used, transferred or deleted without specific authorization for such actions to be done. Any access to Personal Data, as well as any action performed involving the use of Personal Data requires a password and user name, which is routinely changed, as well as blocked when applicable. Each employee is able to perform actions solely in accordance with the permissions granted to him by the Company. Furthermore, the Company conducts ongoing reviews of the employees who have been given authorization to access Personal Data, in order to assess whether such access is still required. The Company revokes access to Personal Data immediately upon termination of employment. Authorized individuals can only access Personal Data that are located in their individual profiles.", "hash": "e1f4289bb36039aebfdbf46a15f86089", "id": 1}, {"samples": [{"hash": "7Sgh2C6ZAJ5", "uri": "/contracts/7Sgh2C6ZAJ5#system-control", "label": "Master Agreement", "score": 26.1553730322, "published": true}, {"hash": "8YtHhzBHoe8", "uri": "/contracts/8YtHhzBHoe8#system-control", "label": "Master Agreement", "score": 25.2395619439, "published": true}], "snippet_links": [{"key": "unless-otherwise-specified-in", "type": "clause", "offset": [0, 29]}, {"key": "the-sales-agreement", "type": "clause", "offset": [30, 49]}, {"key": "provide-a", "type": "definition", "offset": [66, 75]}, {"key": "the-system", "type": "definition", "offset": [123, 133]}], "size": 2, "snippet": "Unless otherwise specified in the Sales Agreement, Purchaser will provide a server with the appropriate provided specs for the System Control application.", "hash": "7774c0f2b46453d1bca35d7788a864a6", "id": 2}, {"samples": [{"hash": "lwEaoZ0J452", "uri": "/contracts/lwEaoZ0J452#system-control", "label": "Parking Citation Processing/Collection Agreement", "score": 19.0, "published": true}], "snippet_links": [{"key": "respond-to", "type": "definition", "offset": [40, 50]}, {"key": "requests-for", "type": "clause", "offset": [51, 63]}, {"key": "remedial-maintenance", "type": "definition", "offset": [64, 84]}, {"key": "reports-of", "type": "clause", "offset": [86, 96]}, {"key": "to-contractor", "type": "definition", "offset": [192, 205]}, {"key": "the-contractor", "type": "clause", "offset": [245, 259]}], "size": 1, "snippet": "Contractor\u2019s System, shall identify and respond to requests for remedial maintenance, reports of System anomalies, and reports of user problems and System questions, including tools available to Contractor's staff, software to be utilized, etc. The Contractor's System shall be supported by staff of experienced, well trained technicians.", "hash": "75b5d095d5a9308f15efcef7f6fef876", "id": 3}, {"samples": [{"hash": "g3yy8XbpNdO", "uri": "/contracts/g3yy8XbpNdO#system-control", "label": "Master Software as a Service Agreement", "score": 35.226099314, "published": true}], "snippet_links": [{"key": "in-this-agreement", "type": "clause", "offset": [39, 56]}, {"key": "between-the-parties", "type": "clause", "offset": [61, 80]}, {"key": "sole-control", "type": "definition", "offset": [112, 124]}, {"key": "the-operation", "type": "clause", "offset": [130, 143]}, {"key": "management-of-the", "type": "clause", "offset": [173, 190]}, {"key": "services-and", "type": "clause", "offset": [198, 210]}, {"key": "by-or-on-behalf-of", "type": "definition", "offset": [243, 261]}, {"key": "all-access", "type": "clause", "offset": [423, 433]}, {"key": "the-customer", "type": "definition", "offset": [449, 461]}, {"key": "responsibility-for", "type": "clause", "offset": [482, 500]}, {"key": "access-to-and-use-of-the", "type": "clause", "offset": [505, 529]}, {"key": "any-person", "type": "definition", "offset": [549, 559]}, {"key": "customer-systems", "type": "definition", "offset": [578, 594]}, {"key": "by-customer", "type": "clause", "offset": [625, 636]}, {"key": "materials-provided", "type": "clause", "offset": [687, 705]}], "size": 1, "snippet": "Except as otherwise expressly provided in this Agreement, as between the parties: (1) Ushur has and will retain sole control over the operation, provision, maintenance, and management of the Hosted Services and Systems (as defined below) used by or on behalf of Ushur in performing the Hosted Services (\u201cUshur Systems\u201d), (2) Customer has and will retain sole control over the operation, maintenance, and management of, and all access to and use of, the Customer\u2019s Systems, and sole responsibility for all access to and use of the Hosted Services by any person by or through the Customer Systems or any other means controlled by Customer, including any: (i) information, instructions, or materials provided by any of them to Ushur;", "hash": "85c613039407b657558dc10134fc9efa", "id": 4}, {"samples": [{"hash": "l7QfLxopMZ9", "uri": "/contracts/l7QfLxopMZ9#system-control", "label": "Gladstone Power Station Agreement", "score": 30.3436512521, "published": true}], "snippet_links": [{"key": "the-state-agrees", "type": "clause", "offset": [0, 16]}, {"key": "control-entity", "type": "definition", "offset": [31, 45]}, {"key": "complying-with", "type": "clause", "offset": [144, 158]}, {"key": "under-clause-7", "type": "clause", "offset": [175, 189]}, {"key": "interconnection-and-power-pooling-agreement", "type": "definition", "offset": [197, 240]}], "size": 1, "snippet": "The State agrees that a system control entity will not be given powers about system control which could be exercised so as to prevent QTSC from complying with its obligations under Clause 7 of the Interconnection and Power Pooling Agreement.", "hash": "c6d78e965054b4a7b8ec2ca31cd11780", "id": 5}, {"samples": [{"hash": "adcY2JIdKtj", "uri": "/contracts/adcY2JIdKtj#system-control", "label": "System Purchase Agreement", "score": 23.1498492515, "published": true}], "snippet_links": [{"key": "traffic-controller", "type": "definition", "offset": [4, 22]}, {"key": "the-site", "type": "clause", "offset": [142, 150]}, {"key": "management-information", "type": "clause", "offset": [228, 250]}, {"key": "a-site", "type": "definition", "offset": [268, 274]}, {"key": "control-of-the", "type": "clause", "offset": [410, 424]}, {"key": "site-controller", "type": "definition", "offset": [535, 550]}, {"key": "channel-information", "type": "definition", "offset": [675, 694]}, {"key": "the-working", "type": "clause", "offset": [701, 712]}, {"key": "to-assume", "type": "clause", "offset": [753, 762]}, {"key": "functions-of-the", "type": "clause", "offset": [767, 783]}, {"key": "control-point", "type": "definition", "offset": [1053, 1066]}, {"key": "the-processing", "type": "clause", "offset": [1172, 1186]}, {"key": "the-risk", "type": "definition", "offset": [1247, 1255]}, {"key": "base-stations", "type": "definition", "offset": [1922, 1935]}, {"key": "received-by", "type": "definition", "offset": [1997, 2008]}, {"key": "the-information", "type": "clause", "offset": [2164, 2179]}, {"key": "maximum-amount", "type": "definition", "offset": [2459, 2473]}, {"key": "delay-compensation", "type": "definition", "offset": [2482, 2500]}, {"key": "fault-tolerance", "type": "clause", "offset": [2705, 2720]}, {"key": "the-system", "type": "definition", "offset": [2743, 2753]}, {"key": "provide-the", "type": "clause", "offset": [3017, 3028]}, {"key": "required-by", "type": "definition", "offset": [3050, 3061]}, {"key": "public-safety-agencies", "type": "clause", "offset": [3062, 3084]}, {"key": "phase-2", "type": "definition", "offset": [3210, 3217]}, {"key": "site-access", "type": "definition", "offset": [3376, 3387]}, {"key": "voice-and-data", "type": "clause", "offset": [3479, 3493]}, {"key": "phase-1", "type": "clause", "offset": [3590, 3597]}, {"key": "data-use", "type": "definition", "offset": [3643, 3651]}, {"key": "associated-with", "type": "definition", "offset": [3740, 3755]}, {"key": "a-copy-of-the", "type": "clause", "offset": [3955, 3968]}, {"key": "subscriber-authorization", "type": "clause", "offset": [4003, 4027]}, {"key": "to-act", "type": "definition", "offset": [4138, 4144]}, {"key": "remote-software", "type": "clause", "offset": [4461, 4476]}, {"key": "remote-diagnosis", "type": "definition", "offset": [4660, 4676]}, {"key": "down-time", "type": "definition", "offset": [4693, 4702]}, {"key": "refer-to", "type": "definition", "offset": [4786, 4794]}, {"key": "figure-4", "type": "definition", "offset": [4795, 4803]}, {"key": "power-supply", "type": "clause", "offset": [4845, 4857]}, {"key": "capable-of", "type": "definition", "offset": [5019, 5029]}, {"key": "front-end", "type": "clause", "offset": [5315, 5324]}, {"key": "additional-charge", "type": "clause", "offset": [5774, 5791]}, {"key": "your-investment", "type": "definition", "offset": [5910, 5925]}, {"key": "radio-communications", "type": "clause", "offset": [6031, 6051]}, {"key": "day-1", "type": "definition", "offset": [6106, 6111]}, {"key": "technology-platform", "type": "definition", "offset": [6414, 6433]}, {"key": "ancillary-equipment", "type": "definition", "offset": [6548, 6567]}, {"key": "mobile-data", "type": "definition", "offset": [6576, 6587]}, {"key": "network-data", "type": "definition", "offset": [6635, 6647]}, {"key": "redundancy-benefit", "type": "clause", "offset": [6650, 6668]}, {"key": "requirements-for", "type": "clause", "offset": [6716, 6732]}, {"key": "comprised-of", "type": "clause", "offset": [6824, 6836]}, {"key": "modular-design", "type": "definition", "offset": [6845, 6859]}, {"key": "software-interface", "type": "definition", "offset": [6896, 6914]}, {"key": "functional-design", "type": "definition", "offset": [7019, 7036]}, {"key": "the-user", "type": "clause", "offset": [7072, 7080]}, {"key": "make-changes", "type": "clause", "offset": [7084, 7096]}, {"key": "maintenance-and-servicing", "type": "clause", "offset": [7175, 7200]}], "size": 1, "snippet": "The Traffic Controller in each base station maintains all of the trunking logic. These station controllers interconnect to one another and to the Site Link 25 controller, which allows the Site Link 25 controller to collect site management information. In the event of a Site Link 25 controller failure, non-critical management features would be reduced, while all trunking features would be retained under the control of the Traffic Controller. The Traffic Controller takes all of the trunking intelligence and control out of a single Site Controller computer and distributes them among the repeaters. These station controllers interconnect, which permits sharing of control channel information among the working channels and allows any working channel to assume the functions of the control channel. This eliminates the possibility of a site failing into conventional-only mode due to all control channel capable stations failing. At the transmit site, the signals are processed by the site's simulcast equipment and interfaced to the remote simulcast control point controllers. In P25IP GPS simulcast, there is no Site Controller computer at the transmit site. Instead, the processing is distributed in the station controllers, which eliminates the risk of a single-point failure. In the unlikely event that communication is lost between a transmit site and the control point, these station controllers will allow the site to continue local trunking. A call is assigned at the simulcast control point controllers. The audio or data is synchronized and processed before being passed via microwave or fiber to each transmit site. The transmit site resynchronizes the audio or data, adds the appropriate delay, and passes it to the assigned station. GPS receivers provide precise timing signals at both the control point and each transmit site. This same GPS signal is used to derive the 10 MHz frequency reference for the base stations at each transmit site. For the return path, audio or data is received by the station at the transmit site. That information is analyzed for bit errors, IP packetized and sent back to the associated channel at the Control Point. The information is compared with data from other RF sites and all that is left for the channel to do is determine which site has provided the signal with the fewest bit errors. The channel then provides the best received signal to the simulcast control point controller for re-transmission. The maximum amount of path delay compensation is 100 microseconds. P25 GPS Simulcast TX/RX Site Equipment\u200c The distributed processing architecture starts at the repeater, the heart of the P25IP GPS Simulcast System. Because of this, a high-degree of fault tolerance is already built into the system, regardless of if it is a simulcast system or a multisite system. The rock-solid reliability provided by P25IP is now enhanced with the introduction of the Traffic Controller described above. Competitors may bid Site Controllers and redundant Site Controllers to provide the level of reliability required by public safety agencies. With \u2587\u2587\u2587\u2587\u2587\u2587\u2019 P25IP GPS Simulcast System, Site Controllers are a thing of the past; \u2587\u2587\u2587\u2587\u2587\u2587 has SMART trunking repeaters! P25 Phase 2 RF Sites\u200c Each of the Metrocrest Quad Cities full-featured P25 Phase 2 sites includes: \uf0a7 Ten (10) rack-mounted MASTR V repeaters and Power Amplifiers (PAs) \uf0a7 Site Access Router \uf0a7 Two-slot TDMA software \uf0a7 MASTR V\u2122 Series Base Stations \u2013 Incorporates P25 digital voice and data using a digital signal processor for maximum design flexibility. The MASTR V can operate in P25 Phase 1 or Phase 2 mode and is also configurable for data use. \uf0a7 SitePro\u2122 Controllers \u2013 The trunking controller consists of a dedicated microcomputer associated with each repeater station. This device enables trunking operation by providing signaling generation and detection, control channel assignment, and working channel repeater control. Each SitePro also has a copy of the site access database which tracks subscriber authorization. This distributed architecture across all channels in the system enhances reliability by allowing any station to act as a control channel with automatic rotation in the event of control channel failure. Features\u200c Architecture\u200c The MASTR V Base Station is a P25 Phase 2 capable transceiver. The MASTR V Base Station is a digital, IP based, LMR communications base station operating within a compact shelf design. It supports IP-based remote software uploads and configuration. IP-based programming may be accomplished using the VIDA Device Manager programming tool. A built-In Self Test feature provides improved performance through remote diagnosis which minimizes down time. The MASTR V Base Station uses a 14-slot modular multi-channel T/R shelf assembly (refer to Figure 4 above) and a 2-slot High Power Amplifier/Power Supply shelf assembly. Modules may include BaseBand Processors, Traffic Controllers, TX, and RX modules. The TX module uses a factory programmable IQ modulator circuit capable of generating most any LMR modulation format into a Direct Digital Synthesis TX exciter circuit. Additionally, the HPA may be equipped with a Linearizer module for improved amplitude and phase noise characteristics in S-C4FM or similar modulation modes. The RX module includes integrated front end and IF circuitry. The RX module also uses IQ demodulation circuitry. The IQ demodulator is factory programmable and can decode most amplitude and phase modulation characteristic, making it capable of receiving most analog or digital LMR modulation format. The multichannel shelf occupies 5-RU spaces. The High Power Amplifier/Power Supply shelf occupies 2- RU spaces (per TX channel). The MASTR V Base Station for MQC has P25 Phase 2 included at no additional charge. P25 Phase 2 can double the system\u2019s capacity via 2-slot TDMA without adding additional RF channels \u2013 future proofing your investment! MASTR V Base Station\u200c We are proposing our MASTR V digital base station to power secure digital trunked radio communications via Project 25. The MASTR V provides P25 Phase 2 from day 1. The MASTR V incorporates P25 digital voice and data using a digital signal processor for maximum design flexibility. The MASTR V enables IP voice and data packets to be sent over the P25 Phase 2 network and be received at the base station. This setup enables all of the advantages of \u2587\u2587\u2587\u2587\u2587\u2587\u2019 IP-based technology platform including: \uf0a7 Seamless integration of off-the-shelf IP data applications \uf0a7 Easy interconnection of peripherals and ancillary equipment such as mobile data terminals \uf0a7 Economical routing and backhaul of network data \uf0a7 Redundancy benefit of distributed IP architecture, one of the key requirements for most public safety users The MASTR V employs linear simulcast for superior coverage and is comprised of a fully modular design. The MASTR V employs an easy-to-use software interface that provides flexibility, simplified setup, and easy field upgrades as well as remote programming. The functional design of the MASTR V base station allows the user to make changes quickly, easily, and affordably. The modular design of the base station makes maintenance and servicing simple and fast. All MASTR V stations for Metrocrest will include P25 Phase 2. This permits MQC to double the system\u2019s capacity without adding additional RF channels. This future proofs MQC\u2019s investment.", "hash": "1b98f54ceb9c678840d8387231435c03", "id": 6}, {"samples": [{"hash": "2JOR93W1Wvi", "uri": "/contracts/2JOR93W1Wvi#system-control", "label": "Merchant Integration Agreement", "score": 31.913884542, "published": true}], "snippet_links": [{"key": "between-the-parties", "type": "clause", "offset": [3, 22]}, {"key": "each-party", "type": "clause", "offset": [24, 34]}, {"key": "sole-control", "type": "definition", "offset": [55, 67]}, {"key": "the-operation", "type": "clause", "offset": [73, 86]}, {"key": "management-of", "type": "clause", "offset": [116, 129]}, {"key": "sole-responsibility-and-liability", "type": "clause", "offset": [170, 203]}, {"key": "in-this-agreement", "type": "clause", "offset": [267, 284]}, {"key": "merchant-systems", "type": "definition", "offset": [322, 338]}], "size": 1, "snippet": "As between the Parties, each Party has and will retain sole control over the operation, provision, maintenance, and management of their respective Systems and shall have sole responsibility and liability with respect thereto, other than as may be expressly set forth in this Agreement. \u201cSystems\u201d means, as applicable, the Merchant Systems and the Banyan Systems.", "hash": "ef4f1dc4e05edcfb6547f972f8640a37", "id": 7}, {"samples": [{"hash": "7jtEHrP68u3", "uri": "/contracts/7jtEHrP68u3#system-control", "label": "Maintenance Agreement", "score": 30.2358782154, "published": true}], "snippet_links": [{"key": "in-this-agreement", "type": "clause", "offset": [39, 56]}, {"key": "sole-control", "type": "definition", "offset": [91, 103]}, {"key": "the-operation", "type": "clause", "offset": [109, 122]}, {"key": "management-of-the", "type": "clause", "offset": [152, 169]}, {"key": "all-access", "type": "clause", "offset": [293, 303]}, {"key": "customer-systems", "type": "definition", "offset": [323, 339]}, {"key": "access-to-and-use-of-the", "type": "clause", "offset": [369, 393]}, {"key": "any-person", "type": "definition", "offset": [416, 426]}, {"key": "by-customer", "type": "clause", "offset": [488, 499]}, {"key": "authorized-user", "type": "clause", "offset": [507, 522]}, {"key": "any-reports", "type": "clause", "offset": [534, 545]}, {"key": "based-on", "type": "clause", "offset": [645, 653]}], "size": 1, "snippet": "Except as otherwise expressly provided in this Agreement: (i) Superion has and will retain sole control over the operation, provision, maintenance, and management of the Superion Solutions; and (ii) Customer has and will retain sole control over the operation, maintenance, management of, and all access to and use of, the Customer Systems, and sole responsibility for access to and use of the Superion Solutions by any Person by or through the Customer Systems or other means controlled by Customer or any Authorized User, including any reports or results obtained from any use of the Superion Solutions, and conclusions, decisions, or actions based on such use.", "hash": "84dbb8202ea153f8582964bbdeb7bf3d", "id": 8}, {"samples": [{"hash": "egtIjjW7VeP", "uri": "/contracts/egtIjjW7VeP#system-control", "label": "Grant Agreement", "score": 20.3413101143, "published": true}], "snippet_links": [{"key": "access-system", "type": "clause", "offset": [7, 20]}], "size": 1, "snippet": "5.1.1. Access system", "hash": "bdcd53bd8da496f1798445dfe04fbed9", "id": 9}, {"samples": [{"hash": "eSFo5WwGNGw", "uri": "/contracts/eSFo5WwGNGw#system-control", "label": "Purchase Contract", "score": 28.6355338821, "published": true}], "snippet_links": [{"key": "graphical-user-interface", "type": "clause", "offset": [49, 73]}, {"key": "the-controller", "type": "clause", "offset": [118, 132]}, {"key": "based-on", "type": "clause", "offset": [145, 153]}, {"key": "hard-drive", "type": "definition", "offset": [238, 248]}, {"key": "subject-to-change", "type": "clause", "offset": [361, 378]}, {"key": "the-system", "type": "definition", "offset": [381, 391]}, {"key": "control-of", "type": "definition", "offset": [612, 622]}, {"key": "primary-function", "type": "clause", "offset": [710, 726]}, {"key": "type-of", "type": "definition", "offset": [864, 871]}, {"key": "office-software", "type": "clause", "offset": [897, 912]}, {"key": "other-non", "type": "clause", "offset": [945, 954]}, {"key": "instrument-software", "type": "definition", "offset": [955, 974]}, {"key": "remote-access", "type": "definition", "offset": [1017, 1030]}, {"key": "the-instrument", "type": "clause", "offset": [1186, 1200]}, {"key": "repair-time", "type": "definition", "offset": [1269, 1280]}, {"key": "quality-of-service", "type": "clause", "offset": [1370, 1388]}, {"key": "system-performance", "type": "clause", "offset": [1548, 1566]}, {"key": "by-the-customer", "type": "clause", "offset": [1683, 1698]}, {"key": "internet-connection", "type": "definition", "offset": [1728, 1747]}, {"key": "full-details", "type": "definition", "offset": [1797, 1809]}], "size": 1, "snippet": "The Quattro S is controlled from an MS-Windows 7 graphical user interface running at a 1920 x 1200 screen resolution. The controller computer is based on an Intel Xeon W3520 Processor/ 2.66 GHz 8 MB cache, 12 GB system memory, one 500 GB hard drive, one 16x DVD+/-RW drive, integrated FireWire and USB ports and a 1 Gb LAN network card (computer specifications subject to change). The system includes a 24\u201d LCD monitor, keyboard, optical mouse and a height-adjustable office desk. A USB manual user interface (for controlling magnification, contrast/brightness, beam shift and stigmators) and/or a Joystick (for control of stage movement) is optionally available. The microscope controller is dedicated to its primary function, includes a DVD/RW and has a possibility to connect directly to a LAN. Optionally, a support computer can be connected for additional PC-type of functionality such as MS-Office software suite, firewall, anti-virus and other non-instrument software. This instrument is RAPID-enabled. RAPID (Remote Access Program for Interactive Diagnostics) is a highly secure connectivity tool that enables Thermo \u2587\u2587\u2587\u2587\u2587\u2587 Scientific\u2019s service engineers to connect directly to the instrument to address system issues remotely. RAPID can significantly speed up repair time and thus reduce instrument downtimes, while improving Thermo \u2587\u2587\u2587\u2587\u2587\u2587 Scientific\u2019s overall quality of service. Thermo \u2587\u2587\u2587\u2587\u2587\u2587 Scientific\u2019s service engineers use RAPID to perform remote system diagnostics and repairs, support user operation and view images for enhancing system performance. However, customers maintain complete control of how and when RAPID is used -- each RAPID session must be initiated by the customer. RAPID requires a high-speed internet connection (> 5 MB/sec recommended, 1 MB/sec required). For full details please browse to the RAPID pages on the Thermo \u2587\u2587\u2587\u2587\u2587\u2587 Scientific website.", "hash": "28ed9a2c07e9d707e56d83fb558dbe27", "id": 10}], "next_curs": "ClcSUWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjMLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhdzeXN0ZW0tY29udHJvbCMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"parents": [["definitions", "Definitions"], ["project-closure", "PROJECT CLOSURE"], ["purchaser-responsibilities", "Purchaser Responsibilities"], ["provision-of-access-credentials-by-banyan", "Provision of Access Credentials by Banyan"], ["amendment", "Amendment"]], "title": "System Control", "children": [["", ""], ["team-leader", "Team leader"], ["guest", "Guest"], ["member", "Member"]], "size": 15, "id": "system-control", "related": [["job-control", "Job Control", "Job Control"], ["input-control", "Input Control", "Input Control"], ["data-input-control", "Data Input Control", "Data Input Control"], ["traffic-control", "Traffic Control", "Traffic Control"], ["subsidy-control", "SUBSIDY CONTROL", "SUBSIDY CONTROL"]], "related_snippets": [], "updated": "2025-07-07T16:38:45+00:00", "also_ask": [], "drafting_tip": null, "explanation": "The System Control clause establishes which party has the authority to manage, operate, or make decisions regarding a particular system or set of systems within the scope of the agreement. Typically, this clause outlines the responsibilities for maintaining, updating, and securing the system, and may specify who can authorize changes or grant access to users. By clearly defining control, the clause helps prevent disputes over system management and ensures that accountability for system performance and security is properly allocated."}, "json": true, "cursor": ""}}