Requirement elicitation methodology Sample Clauses

Requirement elicitation methodology. PALANTIR offers Security-as-a-Service in a variety of delivery modes (cloud/light/edge) allowing clients not only to select the level of protection that best fits their needs but also the level of information they would like to communicate to and receive from other PALANTIR users. To this end, it leverages (i) a Risk Analysis Framework that allows the quantification of security/privacy threats based on security/privacy impact assessment and its correlation with the attack surface analysis; (ii) Network Function Virtualisation (NFV) for virtualization and dynamic placement of security appliances in the network; (iii) a hybrid Threat Intelligence framework for real-time incident detection and mitigation; and (iv) a Trust and Attestation framework for securing both infrastructure and services. Three high- level use cases are identified as the most relevant for PALANTIR and are described in detail in D2.4: • Use Case #1: Securing private medical practices with lightweight SecaaS for the protection of medical data, illustrating relevant cases of incident detection and mitigation activities to safeguard patient data and prevent medical identity theft.

Related to Requirement elicitation methodology

  • Payment Methodology The Grantee shall be reimbursed for actual, reasonable, and necessary costs based upon the Grant Budget, not to exceed the Maximum Liability established in Section 1. Upon progress toward the completion of the Scope, as described in Section A of this Grant Contract, the Grantee shall submit invoices prior to any reimbursement of allowable costs.

  • Contractor Selection Justification Form Customers shall complete this Contractor Selection Justification Form for each candidate selected and attach all completed forms to the purchase order. Date: Contractor’s Name: _ Contractor’s Contact Information: Address: _ Phone: _ Email: Candidate’s Name: _ Date Candidate will be available: _ Hourly rate of candidate: $ Position candidate recommended for: _ Justification for selection of candidate: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Agency: Division/Section/Unit: _ Printed Name: _ Title: _ Signature _ Date: Contractor's Name: Quarter: Purchase Order (PO) Number: PO Total $ Amount: PO Starting Date Ending Date Please review the attached Rating Definitions and provide your opinion by rating the following:

  • Claims Review Methodology ‌‌ a. C laims Review Population. A description of the Population subject‌‌ to the Quarterly Claims Review.

  • Service Providing Methodology 1.3.1 Party A and Party B agree that during the term of this Agreement, where necessary, Party B may enter into further service agreements with Party A or any other party designated by Party A, which shall provide the specific contents, manner, personnel, and fees for the specific services. 1.3.2 To fulfill this Agreement, Party A and Party B agree that during the term of this Agreement, where necessary, Party B may enter into equipment or property leases with Party A or any other party designated by Party A which shall permit Party B to use Party A’s relevant equipment or property based on the needs of the business of Party B. 1.3.3 Party B hereby grants to Party A an irrevocable and exclusive option to purchase from Party B, at Party A’s sole discretion, any or all of the assets and business of Party B, to the extent permitted under PRC law, at the lowest purchase price permitted by PRC law. The Parties shall then enter into a separate assets or business transfer agreement, specifying the terms and conditions of the transfer of the assets.

  • Service Level Expectations Without limiting any other requirements of the Agreement, the Service Provider shall meet or exceed the following standards, policies, and guidelines: