Cloud Solutions Clause Samples

The 'Cloud Solutions' clause defines the terms and conditions under which cloud-based services or software are provided to the customer. It typically outlines the scope of services, data storage and processing locations, security measures, and responsibilities of both the provider and the customer regarding access and use of the cloud platform. For example, it may specify uptime commitments, data backup procedures, or restrictions on data transfer outside certain jurisdictions. This clause is essential for clarifying expectations, ensuring compliance with data protection laws, and allocating risk between the parties in relation to the use of cloud technologies.
Cloud Solutions. Application Service Providers hosting OCHCA data must meet the following additional requirements and are required to comply with and provide deliverables noted below: • SSAE 18. SSAE 18 SOC 2 Type 2 or SOC 3 compliance certificate • Network Intrusion Detection and Prevention. All systems that are accessible via the internet must actively use a network based intrusion detection and prevention solution.
Cloud Solutions. Application Service Providers hosting OCHCA data must meet the following additional requirements and are required to comply with and provide deliverables noted below:
Cloud Solutions. Subject to Customer’s continued and full compliance with all of the terms and conditions of this Agreement, including without limitation, Customer’s payment of all of the fees due hereunder, Palantir will provide Customer with access to the Cloud Solution pursuant to the applicable Order during the applicable Term associated with such Cloud Solution solely for its internal business purposes, and only (i) for use in accordance with the Documentation and (ii) for the purposes specified in the applicable Order.
Cloud Solutions. All servers and data associated with the Arkansas instance of the Contractor provided Cloud Products and Services must reside in the continental United States. Contractor shall perform all work on the Cloud Products and Services from within the continental United States of America provided, however, that the State consents to the global delivery of technical assistance and support via Arkansas Department of Transformation and Shared Services Division of Information Systems monitored and controlled access. Except as specified in this section, Cloud Products and Services must not be accessed from outside of the U.S
Cloud Solutions. The products and price list is located on the Contractor’s dedicated State website, hosted and maintained by the Contractor, and is incorporated into this Participating Addendum by reference. It can also be located at ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/, Attachment C of Master Agreement is incorporated into this exhibit as a reference. Changes in product and pricing must be approved by the lead state and shall be effective when published on the dedicated state website. Dedicated website;
Cloud Solutions. Application Service Providers hosting OCHCA data must meet the following additional requirements and are required to comply with and provide deliverables noted below: • Network Intrusion Detection and Prevention. All systems that are accessible via the internet must actively use a network based intrusion detection and prevention solution. • Workstation/Laptop Encryption. All workstations, laptops and mobile devices that process and/or store OCHCA data must be encrypted using full disk encryption that uses a FIPS 140-2 certified algorithm, such as AES, with a 128bit key or higher. • Patch Management. All workstations, laptops, and other systems that access, process and/or store OCHCA data must have appropriate security patches installed. Application Service Providers must utilize a documented patch management process which determines installation timeframe based on risk assessment and vendor recommendations. At a minimum, all applicable patches must be installed within 30 days of vendor release. • Application Access. All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. • Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (§ 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of National Institute of Standards and Technology (NIST) SP 800-30 (▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with ▇▇▇▇▇. • NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following NIST guidelines.
Cloud Solutions. The term “Cloud Solutions” shall refer to the products and services offered under the Master Agreement.
Cloud Solutions 

Related to Cloud Solutions

  • Cloud Services Unless otherwise stated in the Agreement or in the Order, Company grants Customer a limited, non-transferable, non-sublicenseable, non-exclusive, worldwide license to access and use the Number of Units of Cloud Services during the Term solely for internal business purposes in accordance with the applicable license restrictions stated in the Business Unit Terms, Order, and Documentation. Additional Cloud Service Terms are stated at ▇▇▇▇▇://▇▇▇▇▇.▇▇▇▇▇.▇▇▇/#cloud-services, which are incorporated by reference.

  • Cloud storage DSHS Confidential Information requires protections equal to or greater than those specified elsewhere within this exhibit. Cloud storage of Data is problematic as neither DSHS nor the Contractor has control of the environment in which the Data is stored. For this reason: (1) DSHS Data will not be stored in any consumer grade Cloud solution, unless all of the following conditions are met: (a) Contractor has written procedures in place governing use of the Cloud storage and Contractor attests in writing that all such procedures will be uniformly followed. (b) The Data will be Encrypted while within the Contractor network. (c) The Data will remain Encrypted during transmission to the Cloud. (d) The Data will remain Encrypted at all times while residing within the Cloud storage solution. (e) The Contractor will possess a decryption key for the Data, and the decryption key will be possessed only by the Contractor and/or DSHS. (f) The Data will not be downloaded to non-authorized systems, meaning systems that are not on either the DSHS or Contractor networks. (g) The Data will not be decrypted until downloaded onto a computer within the control of an Authorized User and within either the DSHS or Contractor’s network. (2) Data will not be stored on an Enterprise Cloud storage solution unless either: (a) The Cloud storage provider is treated as any other Sub-Contractor, and agrees in writing to all of the requirements within this exhibit; or, (b) The Cloud storage solution used is FedRAMP certified. (3) If the Data includes protected health information covered by the Health Insurance Portability and Accountability Act (HIPAA), the Cloud provider must sign a Business Associate Agreement prior to Data being stored in their Cloud solution.

  • Games The Private Party shall not be entitled to introduce any arcade type amusement or gaming machines into the Restaurant Facility without the prior written approval of SANParks.

  • Analytics 1.1. IFS may track and analyze the usage of the IFS Offering for purposes of determining usage made of the IFS Offering, for the purposes of security, to assist customers, and for improving the Software and Services and the user experience in using such Software and Services. For example, IFS may use this information to help customers derive more value from the Software and Services, to understand and analyze trends, or to track which features are used most often in order to improve the Software and Services. IFS may share anonymous usage data with its service providers for the purpose of helping in such tracking, analysis and improvements. Additionally, IFS may share such anonymous usage data on an aggregate basis in the normal course of operating their business; for example, IFS may share information publicly to show trends about the general use of its software and services. TERMS - SERVICES

  • Generelt A. Apple Inc. (“Apple”) giver hermed licenstager licens til at bruge Apples software samt tredjeparters software, dokumentation, grænseflader, indhold, skrifter og evt. data, som følger med denne licens, uanset om de forefindes som ROM (Read Only Memory) eller på andet medie (under et kaldet “Apple- software”) i henhold til betingelserne i denne licensaftale. Apple og/eller Apples licensgivere bevarer ejendomsretten til selve Apple-softwaren og forbeholder sig alle de rettigheder, som ikke udtrykkeligt er givet til licenstager B. Apple vil efter eget valg evt. frigive fremtidige opgraderinger eller opdateringer til Apple-softwaren til licenstagers kompatible iOS- eller iPadOS-enhed (under et kaldet Apple-enhed) fra Apple. Evt. Apple- softwareopgraderinger og -opdateringer inkluderer ikke nødvendigvis alle de eksisterende softwarefunktioner eller nye funktioner, som Apple frigiver til nyere eller andre modeller af Apple-enheder. Licenstagers rettigheder i henhold til denne licens omfatter alle de softwareopgraderinger eller - opdateringer leveret af Apple til det originale Apple-softwareprodukt, medmindre opgraderingerne eller opdateringerne indeholder en separat licens, i hvilket fald licenstager erklærer sig indforstået med, at betingelserne i den licens er gældende for sådanne opgraderinger eller opdateringer