Microsoft Power Automate Clause Samples

The "Microsoft Power Automate" clause defines the terms under which Microsoft Power Automate services are provided or used within the agreement. It typically outlines the scope of permitted use, any restrictions, and the responsibilities of the parties regarding automation workflows created with the service. For example, it may specify how data is processed, stored, or integrated with other Microsoft products. The core function of this clause is to clarify the rights and obligations related to Power Automate, ensuring both parties understand how the service can be utilized and any limitations that apply.
Microsoft Power Automate. Cognito Forms integrates with Microsoft Power Automate to enable integration with hundreds of other cloud services. This integration requires a separate BAA directly with Microsoft, as {Organization} controls the information and processing once it is transmitted securely by Cognito Forms to Power Automate. Not all services Power Automate connects to are HIPAA compliant. Microsoft Power Automate should be used as an alternative to Zapier, as Zapier does not offer a BAA covering their services.

Related to Microsoft Power Automate

  • Interconnection Customer Authority Consistent with Good Utility Practice, this LGIA, and the CAISO Tariff, the Interconnection Customer may take actions or inactions with regard to the Large Generating Facility or the Interconnection Customer’s Interconnection Facilities during an Emergency Condition in order to (i) preserve public health and safety, (ii) preserve the reliability of the Large Generating Facility or the Interconnection Customer’s Interconnection Facilities,

  • Power; Authorization Such Investor has all requisite power and authority to execute and deliver this Agreement. This Agreement, when executed and delivered by such Investor, will constitute a valid and legally binding obligation of such Investor, enforceable in accordance with its respective terms, except as: (a) limited by applicable bankruptcy, insolvency, reorganization, moratorium and other laws of general application affecting enforcement of creditors’ rights generally; and (b) limited by laws relating to the availability of specific performance, injunctive relief or other equitable remedies.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.