Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.
Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.
Hosting 44.7.4.1 At CLEC’s request, SBC-10STATE shall perform hosting responsibilities for the provision of billable message data and/or access usage data received from CLEC for distribution to the appropriate billing and/or processing location or for delivery to CLEC of such data via SBC-10STATE’s internal network or the nationwide CMDS network pursuant to the applicable Appendix HOST, which is/are attached hereto and incorporated herein by reference.
Software The Software is licensed to you subject to any terms and conditions presented when you downloaded it from a source authorized by NCR Voyix, as well as those contained in this Agreement. If there is a conflict, this Agreement will control. You are licensed to use the Software only with the Service and with Hardware purchased or subscribed from NCR Voyix or its Resellers. Your license to any Software will end when your subscription to the Service ends. The Software is copyrighted and licensed, not sold, and is NCR Voyix’s confidential and unpublished information. You will retain any copyright notices and proprietary legends on all copies of the Software and the media on which it is delivered. Any attempt to transfer the Software is void and will automatically cause your license to end.
Programming Processor is not responsible for programming or reprogramming of fuel dispensers.