Client’s Environment definition
Examples of Client’s Environment in a sentence
Client will, as from the Commencement Date, make available the Client’s Environment and information assets for CSI’s use in the delivery of the Managed Services.
During the term of this Agreement: (a) Usherwood will be the sole and exclusive provider of information technology support services with respect to the function and operation of Client’s Environment; and (b) Client will restrict solely to Usherwood, all access to Client’s Environment for the purpose of maintenance unless Usherwood provides its prior written consent otherwise.
At any time, iVenture may audit Client’s usage of the Services to determine whether Client’s Environment and use of the Services remains in compliance with the fees and rates set forth in this Agreement, which may be determined and based upon the Environment, including the number Managed Users, Managed Hardware, Supported Software, Managed Windows Server Environment, Managed PC, and Managed Network (each a “Usage Audit”).
Emergency: a serious event or circumstance which impacts or is reasonably likely to impact the Client’s Environment or the provision of the Software Subscription Services and requires AutoRek to take urgent action and/or remediation to prevent disruption of, or damage or disablement to, the Software Subscription Services or the Environment.
In the context of suspected Error with the LSX, Client will provide either a Java class implementation, or, actual LSX function, then in use in Client’s Environment (with such source code that is sufficient to demonstrate the Error condition so the Error can be recreated by ASSET) that would simulate calls to Client’s external systems with stubs.
Client is required to obtain and maintain , at Client’s expense, cyber liability insurance covering Client’s Environment with financially sound and reputable insurers covering at a minimum against cyberattacks, data loss, malware-related matters, theft or misuse of private or confidential information, privacy-related breaches, the breach of network or any systems, and any failure to prevent the transmission of computer malware, as such incidents can occur even under a “best practice” scenario.