Provision of Data 26.1 The Supplier shall submit all information required under applicable law and regulations, such as but not limited to information required to meet financial and administrative obligations. If Wavin has not received one or more of the requested documents within ten (10) days of making the request, Wavin shall be entitled to suspend payment until the moment of receipt, or to terminate the Agreement without any liability. 26.2 Every change in the data submitted under clause 26.1 must be immediately reported to ▇▇▇▇▇ in writing.
Provision of Services (a) The HSP will provide the Services in accordance with, and otherwise comply with: (1) the terms of this Agreement; (2) Applicable Law; and
Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.
Provision of Access Subject to the terms of this Agreement, Flock hereby grants to Agency a non-exclusive, non-transferable right to access the features and functions of the Services via the Web Interface during the Term, solely for the Authorized End Users. The Footage will be available for Agency’s designated administrator, listed on the Order Form, and any Authorized End Users to access and download via the Web Interface for thirty (30) days. Authorized End Users will be required to sign up for an account and select a password and username (“User ID”). Flock will also provide Agency with the Documentation to be used in accessing and using the Services. Agency shall be responsible for all acts and omissions of Authorized End Users, and any act or omission by an Authorized End User which, if undertaken by Agency, would constitute a breach of this Agreement, shall be deemed a breach of this Agreement by Agency. Agency shall undertake reasonable efforts to make all Authorized End Users aware of the provisions of this Agreement as applicable to such Authorized End User’s use of the Services and shall cause Authorized End Users to comply with such provisions. Flock may use the services of one or more third parties to deliver any part of the Services, (such as using a third party to host the Web Interface for cloud storage or a cell phone provider for wireless cellular coverage) which makes the Services available to Agency and Authorized End Users. Warranties provided by said third party service providers are the agency’s sole and exclusive remedy and ▇▇▇▇▇’s sole and exclusive liability with regard to such third-party services, including without limitation hosting the Web Interface. Agency agrees to comply with any acceptable use policies and other terms of any third-party service provider that are provided or otherwise made available to Agency from time to time.
Marking of Data Pursuant to Paragraph A above, any Data delivered under this Agreement shall be marked with the following legend: Use, duplication, or disclosure is subject to the restrictions as stated in Agreement HR0011-XX-9-XXXX between the Government and the Performer.