Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.
Troubleshooting USER AGENCY agrees that its employees will contact the USER AGENCY Information Technology (IT) Department or representatives before contacting SYSTEM PROVIDER regarding issues related to this Agreement. USER AGENCY agrees that if its IT Department determines there is a problem related to connectivity with SYSTEM PROVIDER, the USER AGENCY will contact SYSTEM PROVIDER's IT Help Desk at (▇▇▇) ▇▇▇-▇▇▇▇ and will send an email to ▇▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇.▇▇▇. After business hours, USER AGENCY may contact the SYSTEM PROVIDER Police Command and Control Center at (▇▇▇) ▇▇▇-▇▇▇▇ for assistance. SYSTEM PROVIDER agrees to make reasonable efforts to identify and remediate any problem as quickly as possible; however, SYSTEM PROVIDER does not guarantee any specific uptime, nor is SYSTEM PROVIDER liable for any damages associated with performance under this Agreement, including but in no way limited to any downtime.
Year 2000 Compatibility Take all actions necessary to assure the Borrower's computer based systems are able to operate and effectively process data on and after January 1, 2000. At the request of the Lender, the Borrower shall provide the Lender with assurance acceptable to the Lender that Borrower's computer systems have Year 2000 compatibility.
System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.
Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case. 2. Nothing in this Article and Articles 25A to 25G shall affect the fulfilment of wider obligations with respect to the arbitration of unresolved issues arising in the context of a mutual agreement procedure resulting from other conventions to which the Contracting States are or will become parties.”.