Web Site Backup and Restoration Sample Clauses

Web Site Backup and Restoration. Customer acknowledges and agrees that (i) it is responsible for developing and maintaining procedures (apart from the Services) to protect the Customer content, including, without limitation, making appropriate backup copies of the Customer content as may be necessary for reconstruction of any data, files, informational materials, or electronic messages; and (ii) Comcast is not responsible for backup and restoration of Customer Content.
Web Site Backup and Restoration. Customer acknowledges and agrees that (i) it is responsible for developing and maintaining procedures (apart from the Services) to protect the Customer content, including, without limitation, making appropriate backup copies of the Customer content as may be necessary for reconstruction of any data, files, informational materials, or electronic messages; and (ii) SKYFREQUENCY is not responsible for backup and restoration of Customer Content. ARTICLE 14A: PROVISION OF SERVICE/USE. Subject to the terms and conditions herein, Internet Services are intended for commercial use only. Customer is prohibited from reselling Internet Services, except that Customer may use such Services to provide internet service to its short-term lodging accommodation end users. SKYFREQUENCY shall provide Internet Service to a demarcation point at the Service Location. Customer shall be responsible for any and all facilities, equipment and/or devices required to use Hospitality Internet Services on the customer-side of the demarcation point.

Related to Web Site Backup and Restoration

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Performance Improvement Plan timely and accurate completion of key actions due within the reporting period 100 percent The Supplier will design and develop an improvement plan and agree milestones and deliverables with the Authority 3.2 The Authority may from time to time make changes to the KPIs measured as set out in paragraph 3.1 above and shall issue a replacement version to the Supplier. The Authority shall give notice In Writing of any such change to the KPIs measured and shall specify the date from which the replacement KPIs must be used for future reports. Such date shall be at least thirty (30) calendar days following the date of the notice to the Supplier.