Email Hosting Sample Clauses

The Email Hosting clause defines the terms under which email services are provided and managed for the client. It typically outlines the responsibilities of the service provider regarding server maintenance, uptime guarantees, data security, and support for email-related issues. For example, it may specify the types of email accounts included, storage limits, and protocols supported (such as IMAP or POP3). The core function of this clause is to ensure both parties understand the scope and limitations of the email hosting service, thereby reducing misunderstandings and clarifying expectations.
POPULAR SAMPLE Copied 1 times
Email Hosting. (If selected)
Email Hosting. The Email Hosting service is provided subject to a storage quota communicated by Etisalat. Once the Customer meets or exceeds the quota, the incoming emails will be returned to the sender as undeliverable. Etisalat accepts no responsibility or liability whatsoever in relation to the Customer’s use of the Email Hosting Service, including the content of any incoming or outgoing emails.
Email Hosting. 3.1 If you request that we provide you with our email hosting service, we will do so on the terms set out in this clause 3.
Email Hosting. The Agency will create branded emails for Client and The Client’s staff at The Client’s request depending on the scale of the project. Client agree that The Agency remains the sole manager of The Client’s email hosting. The Agency will endeavour to protect The Client’s privacy at all cost, The Client’s emails will neither be published nor the passwords shared and the Agency shall be held accountable for loss of data or password breach caused by the Agency. Should the case of management be otherwise, there must be a written agreement either on paper or email as to how The Client’s email addresses should be managed.
Email Hosting. Our email hosting service gives you the ability to send and receive electronic mail via the internet by means of a personalized address linked to your own domain name, subject to the terms and conditions contained in this agreement, ETI will use commercially reasonable efforts to maintain e-mail accessibility
Email Hosting 

Related to Email Hosting

  • ▇▇▇ Hosting 10.1 ▇▇▇ Hosting is not required for resale in the BellSouth region.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Website Hosting The Company shall host and maintain the website specified in paragraph (j)(1)(iii) of Rule 498A, so that the Fund Documents are publicly accessible, free of charge, at that website, in accordance with the conditions set forth in that paragraph, provided that the Fund and Underwriter fulfill their obligations under this Amendment.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.