COUNTY USER ACCESS PROGRAM (UAP Sample Clauses

COUNTY USER ACCESS PROGRAM (UAP a) User Access Fee Pursuant to Section 2-8.10 of the Miami-Dade County Code, this Contract is subject to a user access fee under the County User Access Program (UAP) in the amount of two percent (2%). All sales resulting from this Contract, or any contract resulting from the solicitation referenced on the first page of this Contract, and the utilization of the County Contract price and the terms and conditions identified herein, are subject to the two percent (2%) UAP. This fee applies to all Contract usage whether by County Departments or by any other governmental, quasi- governmental or not-for-profit entity. The Contractor providing goods or services under this Contract shall invoice the Contract price and shall accept as payment thereof the Contract price less the 2% UAP as full and complete payment for the goods and/or services specified on the invoice. The County shall retain the 2% UAP for use by the County to help defray the cost of the procurement program. Contractor participation in this invoice reduction portion of the UAP is mandatory.
AutoNDA by SimpleDocs
COUNTY USER ACCESS PROGRAM (UAP a) User Access Fee Pursuant to Section 2-8.10 of the Code, this Contract is subject to a user access fee under the County User Access Program (“UAP”) in the amount of two percent (2%). All sales resulting from this Contract, or any contract resulting from the solicitation referenced on the first page of this Contract, and the utilization of the County Contract price and the terms and conditions identified herein, are subject to the two percent (2%) UAP. This fee applies to all Contract usage whether by County Departments or by any other governmental, quasi- governmental or not-for-profit entity. The Contractor providing goods or services under this Contract shall invoice the Contract price and shall accept as payment thereof the Contract price less the 2% UAP as full and complete payment for the goods and/or services specified on the invoice. The County shall retain the 2% UAP for use by the County to help defray the cost of the procurement program. Contractor participation in this invoice reduction portion of the UAP is mandatory.
COUNTY USER ACCESS PROGRAM (UAP. 48.1 User Access Fee: Pursuant to Miami-Dade County Budget Ordinance No. 03-192, this Contract is subject to a user access fee under the County User Access Program (UAP) in the amount of two percent (2%). All sales resulting from this Contract, or any contract resulting from this solicitation and the utilization of the County Contract price and the terms and conditions identified herein, are subject to the two percent (2%) UAP. This fee applies to all Contract usage whether by County Departments or by any other governmental, quasi-governmental or not-for-profit entity. The Seller providing goods or Services under this Contract shall invoice the Contract price and shall accept as payment thereof the Contract price less the 2% UAP as full and complete payment for the goods and/or Services specified on the invoice. The County shall retain the 2% UAP for use by the County to help defray the cost of the procurement program. Vendor participation in this invoice reduction portion of the UAP is mandatory.
COUNTY USER ACCESS PROGRAM (UAP. Pursuant to Section 2-8.10 of the Code of Miami-Dade, Florida this Agreement is subject to a user access fee under the County User Access Program (“UAP”) in the amount of two percent (2%). All sales resulting from this Agreement, or any contract resulting from the solicitation referenced on the first page of this Agreement, and the utilization of the County Agreement price and the terms and conditions identified herein, are subject to the two percent (2%) UAP. This fee applies to all Agreement usage whether by County Departments or by any other governmental, quasi-governmental or not-for-profit entity. The Contractor providing goods or services under this Agreement shall invoice the Agreement price and shall accept as payment thereof the Agreement price less the 2% UAP as full and complete payment for the goods and/or services specified on the invoice. The County shall retain the 2% UAP for use by the County to help defray the cost of the procurement program. Contractor participation in this invoice reduction portion of the UAP is mandatory. If the Station fails to comply with this Article, such default may be a material breach of this Agreement and subject the Station to termination for cause pursuant to Article 5 of this Agreement.
COUNTY USER ACCESS PROGRAM (UAP 

Related to COUNTY USER ACCESS PROGRAM (UAP

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • AIN Selective Carrier Routing for Operator Services, Directory Assistance and Repair Centers 4.3.1 BellSouth will provide AIN Selective Carrier Routing at the request of <<customer_name>>. AIN Selective Carrier Routing will provide <<customer_name>> with the capability of routing operator calls, 0+ and 0- and 0+ NPA (LNPA) 555-1212 directory assistance, 1+411 directory assistance and 611 repair center calls to pre-selected destinations.

  • Local Control Center, Metering and Telemetry The NTO shall operate, pursuant to ISO Tariffs, ISO Procedures, Reliability Rules and all other applicable reliability rules, standards and criteria on a twenty-four (24) hour basis, a suitable local control center(s) with all equipment and facilities reasonably required for the ISO to exercise ISO Operational Control over NTO Transmission Facilities Under ISO Operational Control, and for the NTO to fulfill its responsibilities under this Agreement. Operation of the NYS Power System is a cooperative effort coordinated by the ISO control center in conjunction with local control centers and will require the exchange of all reasonably necessary information. The NTO shall provide the ISO with Supervisory Control and Data Acquisition (“SCADA”) information on facilities listed in Appendices A-1 and A-2 herein as well as on generation and merchant transmission resources interconnected to the NTO’s transmission facilities pursuant to the ISO OATT. The NTO shall provide metering data for its transmission facilities to the ISO, unless other parties are authorized by the appropriate regulatory authority to provide metering data. The NTO shall collect and submit to the ISO billing quality metering data and any other information for its transmission facilities required by the ISO for billing purposes. The NTO shall provide to the ISO the telemetry and other operating data from generation and merchant transmission resources interconnected to its transmission facilities that the ISO requires for the operation of the NYS Power System. The NTO will establish and maintain a strict code of conduct to prevent such information from reaching any unauthorized person or entity.

  • FOREIGN ACCESS TO TECHNOLOGY This Article shall remain in effect during the term of the Agreement and for (INSERT NUMBER OF YEARS) ( ) years thereafter.

  • Authorized User Overview and Mini-Bid Process Project Based IT Consulting Services Contracts enable Authorized Users to use a competitive Mini-bid Process to acquire Services on an as-needed basis, for qualified IT Projects. Project Based IT Consulting Services may include, but will not be limited to projects requiring: analysis, data classification, design, development, testing, quality assurance, security and associated training for Information Technology based applications. See section 1.3 Out of Scope Work for a listing of projects expressly excluded from the scope of this Contract. An Authorized User Agreement for Project Based IT Consulting Services will be governed first by the terms and conditions specified in the OGS Centralized Contract and second by terms and conditions added to the Authorized User Statement of Work. Additional terms and conditions shall not conflict with or modify the terms and conditions of the OGS Centralized Contract. NYS Executive Agencies must adhere to all internal processes and approvals including, as required, approval from NYS Office of Information Technology Services. Other Authorized Users must adhere to their own internal processes and approvals. In accordance with Appendix B, section 28, Modification of Contract Terms, an Authorized User may add additional required terms and conditions to this Mini-Bid and resultant Authorized User Agreement only if such terms and conditions (1) are more favorable to the Authorized User and (2) do not conflict with or supersede the OGS Centralized Contract terms and conditions. Examples of additional terms and conditions include: • Expedited delivery timeframe; • Additional incentives, such as discount for expedited payment/Procurement Card use; and • Any additional requirements imposed by the funding source or Federal law.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

Time is Money Join Law Insider Premium to draft better contracts faster.