Email Archiving Sample Clauses

Email Archiving. VIPRE guarantees 100% recovery of archived email and a 99.9% Availability Percentage for the web interface for email archiving. Your email is sent through our system and a copy is saved in VIPRE’s archive. The mail in our archive can be viewed and resent. A SLA Failure has occurred if the recovery is less than 100%. Tables 4 and 5 apply.
AutoNDA by SimpleDocs
Email Archiving. Barracuda agrees that you will be able to archive emails to Barracuda Email Protection, if you have purchased the relevant subscription, at least 99.9% of the time each calendar month, provided however that downtime or outages related to any server on the Internet, customer premise equipment performance or configuration, transportation of data across the Internet, or any periods during scheduled or emergency maintenance windows or customer-requested service interruptions are not included within the scope of, and are excluded from, this availability commitment (“Email Archiving Commitment”). In addition to the ability to archive emails, this availability commitment also applies to the ability to access and search archived emails using the web interface, mobile apps and Outlook add-in that are provided by Barracuda as part of the archiving solution.
Email Archiving. FuseMail guarantees 100% recovery of archived email and a 99.9% Availability Percentage for the web interface for email archiving. Your email is sent through our system and a copy is saved in FuseMail’s archive. The mail in our archive can be viewed and resent. A SLA Failure has occurred if the recovery is less than 100%. Tables 5 and 6 apply.
Email Archiving. The Mailsphere Email Archiving service stores inbound and outbound email and attachments in the Mailsphere email archive. • Each email and attachment is indexed and stored in the Customer’s archive, which is unique to that Customer, and which is encrypted using 128 bit encryption. The encryption key to the Customer’s archive is available to the Customer and Mailsphere. • Users can search their own personal archive using the Mailsphere user portal. Permitted users can search emails across all users on the domain using the Mailsphere portal. • Advanced search techniques allow the user to search across their archive without learning complex syntax. • Using a multi tier archiving architecture Mailsphere is able to supply industry leading low prices for its long term archive. Recent email is stored in a hot archive, allowing instant access, while emails that are older than one year are moved to the cold archive that is still searchable and accessible but without the high cost of other electronic archives.

Related to Email Archiving

  • Archiving You may make one copy of the Software solely for archival purposes. If the Software is an upgrade, you may use the Software only in conjunction with upgraded product. If you receive your first copy of the Software electronically, and a second copy on media afterward, the second copy can be used for archival purposes only. For all Neevia Tech products, you agree that you will only use our software on a server and all applications that will access the server will reside on the server and you will not permit remote access to the software except through your application residing on the server. You agree to surrender your license(s) if you violate this agreement. If you violate this agreement, you will not receive a refund upon termination of this license. You agree not to utilize our software to violate the copyright of any third parties. If you do violate the copyright of a third party utilizing our software, you agree to hold Neevia Tech harmless and will indemnify Neevia Tech for any such activity even if the violation is unintentional. COPYRIGHT The Software is owned by Neevia Tech and/or its suppliers, and is protected by the copyright and trademark laws of the United States and related applicable laws. You may not copy the Software except as set forth in the "License" section. Any copies that you are permitted to make pursuant to this Agreement must contain the same copyright and other proprietary notices that appear on or in the Software. You may not rent, lease, sub-license, transfer, or sell the Software. You may not modify, translate, reverse engineer, decompile, disassemble, or create derivative works based on the Software, except to the extent applicable law expressly prohibits such foregoing restriction. You may use the trademarks to identify the Software owner's name, or to identify printed output produced by the Software. Such use of any trademark does not give you any rights of ownership in that trademark. NO WARRANTY LICENSED SOFTWARE (S) - "AS IS" The Software is provided AS IS. NEEVIA TECH AND ITS SUPPLIERS MAKE NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE MERCHANTABILITY, QUALITY, NONINFRINGEMENT OF THIRD PARTY RIGHTS, FITNESS FOR A PARTICULAR PURPOSE, AND THOSE ARISING BY STATUTE OR OTHERWISE IN LAW OR FROM A COURSE OF DEALING OR USAGE OF TRADE. THE ENTIRE RISK AS TO THE QUALITY, RESULTS BY USING THE SOFTWARE, AND PERFORMANCE OF THE SOFTWARE IS WITH THE END USER. Some states or jurisdictions do not allow the exclusion or limitation of incidental, consequential or special damages, or the exclusion of implied warranties or limitations on how long an implied warranty may last, so the above limitations may not apply to you or your company.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Electronic Visit Verification (EVV). Provider shall cooperate with State requirements for electronic visit verification for personal care services and home health services, as applicable.

  • Archiving and Reuse Self-Archiving: The Publisher permits the Rights Holder to archive the Contribution in accordance with the Publisher's guidelines, the current version of which is set out in the Appendix "Author's Self-Archiving Guidelines".

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Templates The Applicant shall use Templates provided by Alberta Innovates to comply with its Required Reporting Metrics, Reports obligations, and with the Survey requirements. Because the Reports may contain technical or proprietary information about the Project or the Applicant, the Templates will specify when a section will be considered non-confidential. The content of sections that are marked as non-confidential can be disclosed in the public domain. All other sections will be considered confidential, and thus can only be disclosed to the Government of Alberta and to Funding Partners, if any, in confidence, but to no other party.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Message Screening 9.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from Global Connection local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the Global Connection switching system has a valid signaling relationship.

Time is Money Join Law Insider Premium to draft better contracts faster.