System Management Clause Examples

System Management. Member agencies will comply with System Management direction in order to ensure the safe and efficient operation of ALMR for all members.
System Management. Provide a single point of contact for each installation. Purchaser point of contact shall have authority for all written requests for project changes and shall be available on 24 hours’ notice. In the event that Provider is providing its services as a subcontractor and its work is part of a larger program, Purchaser will keep Provider informed about the overall progress of the program for which Provider’s work is a part, and coordinate Provider’s work with the work being performed by ▇▇▇▇▇▇▇▇▇’s other contractors, including giving Provider sufficient advance notice (at least 5 business days) of when Provider is to perform the work under this Agreement. The foregoing shall not limit Purchaser’s obligations under the terms and conditions of this agreement.
System Management. 4.1 A nominated Organisation Administrator (who must be authorised by your Organisation to make decisions about the management of their data) must manage the Organisation’s compliance with this Agreement. By using the Organisation Administrator Account, the Organisation Administrator agrees the following on behalf of the organisation:
System Management. 1. The Processor shall maintain system security measures in order to prevent itself from unauthorized access, alteration, interception and destruction of information through processing errors, system errors, loss or abuses of the Personal Data. 2. The Processor regularly updates its installed applications in terms of security perspectives. 3. The remote maintenance is controlled by utilizing the following control mechanisms: • access through firewall and VPN; • use of secured workstations; • access right for restricted number of authorized users; • registered user activities.
System Management. Subject to mutual approval, Supplier shall Install and customize tools and processes to allow automated and remote system management of the Gap IT Environment. Such processes shall include Software distribution, backups, performance measurement, tuning, license and asset management and others. (a) Supplier shall monitor for, work to proactively prevent, and remove Malware on the Equipment. (b) Providing analysis and recommendations on communication protocols on systems.
System Management. Contractor specifically represents and warrants that with respect to Contractor-owned and/or controlled Hardware, Software and Environments, Contractor has established and during the term of this Agreement will at all times maintain: Mechanisms to keep security patches current; Monitoring systems and procedures to detect attempted and actual attacks on or intrusions into CDPH data; Procedures to monitor, analyze, and respond to security alerts; Use and regular update of commercial state-of-the- art antimalware software; and Procedures to regularly verify the integrity of installed software.
System Management. System Management includes all Server Hosts, Operating Systems, and Network Equipment. Proper maintenance and monitoring should not be neglected as it offers the best protection against preventable failures and potential security flaws. CNS maintains a technician for critical after-hours events, monitoring Client infrastructure 24 hours a day, 7 days a week. Should a problem occur in the middle of the night, clients have the choice of being contacted immediately by CNS or waiting until next business day to initiate a resolution. a) System Administration i) Changes to existing User Accounts and Office 365 Email ii) Changes to Office 365 subscriptions iii) Security Settings and Privileges b) Application Updates i) Microsoft Office and Edge ii) VMware ESXi iii) Microsoft HyperV iv) Adobe Acrobat and Flash Plugin v) Google Chrome and Earth vi) Oracle Java c) Troubleshooting System-Related Problems d) 24x7 Alert Remediation for Servers i) 24x7 critical alert monitoring ii) After-hours remediation of all critical alerts e) Customization of Monitoring and Alerting Configurations (as requested) f) Coordinate and Assist with Warranty Repairs g) Configuration Documentation h) Network Equipment Firmware Updates i) Regular backup of all Network Equipment Configuration Files j) Email Maintenance, Email Address and Alias Creation k) SPAM Management, Blacklisting and Whitelisting Domains
System Management. Subject to the terms of this Agreement, Licensee grants Manager the right to operate and manage the System to provide for-profit mobile communications services to the public. From and after the Effective Date of this Agreement to the end of the Management Term. Manager shall operate and maintain all system equipment on Licensee’s behalf. Any ancillary network equipment or replacement site equipment purchased by Manager shall remain the property of Manager, and Manager shall be responsible for filing and payment of all taxes related to such equipment. Notwithstanding the foregoing, Manager shall grant to Licensee a lease over all equipment used in operation of the System, which lease shall terminate with respect to each separate item of equipment upon deconstruction from the System as provided for herein. *** Confidential Treatment Requested 1 Exhibit 10.65(a) 3.
System Management. All System management, administrative and operational functions shall be performed by the County and the Sheriff, all as provided in the Participation Agreement. Such System functions also include the following responsibilities: 1. Assignment of radios’ use priorities; 2. Management of Talkgroups to assure appropriate use of the System; 3. Enforcement of System Rules to be established by the Advisory Board; 4. Generate and use statistical data and reports concerning the System Participants’ Talkgroups, call durations, call types, busy signals, and other data analyses and reports as the System will or is able to generate; and 5. Maintain Grade of Service (roaming) and the Motorola Guaranteed Service Level as provided in Section 2.12 of this Agreement; and 6. Maintaining System minimum standards which shall meet or exceed specifications in the Motorola Contract and APCO 25 Standards at all times subject, however, to the exception provided in Section 2.1 of this Agreement respecting Phase 2 Compliance; 7. Maintain audio patches and gateway Interoperability between radio communications systems; 8. Radio configuration and programming standards; 9. Template design and maintenance; and 10. All other services and functions provided elsewhere in this Agreement and the Participation Agreement and as may be dictated by the System Rules or by the License Holders Committee, from time to time.
System Management. Monitoring tools shall be supplied to supplement the tools within the operating system and database. These tools will provide Cendant's Administrator a means to analyze, track and summarize various aspects of the entire system including information, warning and error messages reported by the application. By using all these tools, the administrator can detect application, server and database-related problems, monitor performance, tune the system, and plan upgrades and system maintenance. The Falcon application shall be "instrumented". This means that the application will have various counters whose value will indicate the current state of the system. These monitoring tools, at periodic intervals, will take snapshots of these counters and record them. This record of numbers versus time can be monitored, used to provide trends and exported to a spreadsheet for detailed analysis and generation of reports. Information captured by the application will include: - The number of users currently logged onto the system - The number of users using a component or a feature - The length of time a user is logged on - The length of time a user uses various components - The amount of space in the database that a user uses - The time taken to complete a transaction - The number of transactions completed and aborted - The number of pending requests Information captured by the operating system and database will include: - CPU utilization (number of processes and threads, % user time, cache hit ratio) - Memory utilization (number of page faults, memory allocated) - Disk utilization (disk reads saved, number of reads and writes per second) - Network utilization (bytes read and written per second, number of sessions) - Locks (number of row, page and table locks, total number of locks, average wait time) - Transaction logs (log growth, log truncates, log flushes per second)