Source and Target Systems definition
Examples of Source and Target Systems in a sentence
This includes implementing and managing procedural, technical, and administrative safeguards on its systems and networks sufficient to: (a) ensure the confidentiality, security, integrity, and privacy of Customer Data and (b) follow the principle of least privilege when connecting the Fivetran Products to Customer’s Source and Target Systems, especially by granting no more than read-only access to data sources.
Subject to the terms of this Agreement, Fivetran grants to Customer a limited, personal, non-exclusive, non-transferable, non-sublicensable license to install, integrate and use (a) one copy of any on premise software ordered on the Source and Target Systems for production and use and (b) one copy for disaster recovery purposes for its own internal business purposes only.
Customer is responsible for security relating to its environment, particularly its Source and Target Systems, and security relating to its configuration of the Fivetran Products.
With respect to any Order Form that includes On-Prem Software, subject to the terms of this Agreement, Fivetran grants to Customer a limited, personal, non-exclusive, non-transferable (except as part of a permitted assignment of this Agreement), non-sublicensable license during the subscription term of such Order Form to install, integrate and use for its own internal business purposes such On-Prem Software on the Source and Target Systems.
With respect to any Subscription Order Form that includes On-Prem Software, subject to the terms of this Agreement, Midoffice grants to Customer a limited, personal, non-exclusive, non- transferable (except as part of a permitted assignment of this Agreement), non- sublicensable license during the subscription term of such Subscription Order Form to install, integrate and use for its own internal business purposes such On-Prem Software on the Source and Target Systems.
Customer is responsible for security relating to its environment, particularly its Source and Target Systems, and security relating to its configuration of astRai.
This includes implementing and managing procedural, technical, and administrative safeguards on its systems and networks sufficient to: (a) ensure the confidentiality, security, integrity, and privacy of Customer Data and (b) follow the principle of least privilege when connecting astRai to Customer’s Source and Target Systems, especially by granting no more than read-only access to data sources.