NPC Security Services Sample Clauses

NPC Security Services. Security Services may individually or collectively mean EMV Support, PCI Program, and point-to-point encryption (“P2PE”) or such other service as designated by us. You may utilize P2PE products and services on select terminals using services provided wholly or partially by a third party with our support (collectively referred to as “Security Services”). You bear all risk and responsibility for conducting your own due diligence regarding the fitness of Security Services for a particular purpose and for determining compliance with the Rules Summary, the Operating Regulations, and the Laws. Accordingly, your use of Security Services is at your own risk. Our decision to offer Security Services shall not limit your duties and obligations contained in this provision or the Agreement. You acknowledge that the receipt of Security Services may require the use or upgrading of certain terminals and/or equipment or new message specifications (which shall be at your sole expense) and may not be supported on all terminals/equipment. We do not warrant or guaranty that use of the Security Services , in itself, will: (i) result in your compliance with Rules Summary, Operating Regulations, and/or Laws; (ii) prevent any and all unauthorized iii.
AutoNDA by SimpleDocs
NPC Security Services. Security Services may individually or collectively mean EMV Support, PCI Program, and point-to-point encryption (“P2PE”) or such other service as designated by us. You may utilize P2PE products and services on select terminals using services provided wholly or partially by a third party with our support (collectively referred to as “Security Services”). You bear all risk and responsibility for conducting your own due diligence regarding the fitness of Security Services for a particular purpose and for determining compliance with the Rules Summary, the Operating Regulations, and the Laws. Accordingly, your use of Security Services is at your own risk. Our decision to offer Security Services shall not limit your duties and obligations contained in this provision or the Agreement. You acknowledge that the receipt of Security Services may require the use or upgrading of certain terminals and/or equipment or new message specifications (which shall be at your sole expense) and may not be supported on all terminals/equipment. We do not warrant or guaranty that use of the Security Services , in itself, will: (i) result in your compliance with Rules Summary, Operating Regulations, and/or Laws; (ii) prevent any and all unauthorized breaches of your terminals, systems or facilities; or, (iii) be uninterrupted or error-free. You shall not acquire any interest in (ownership, intellectual property or otherwise) any of the third party provider software used to provide the Security Services. You shall not, and shall have no right to, own, copy, distribute, sub-lease, sub-license, assign or otherwise transfer any portion of such third party provider software used to provide the Security Services or any materials provided by us or to modify, decompile, or reverse engineer any such software, materials, or the Services.

Related to NPC Security Services

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Third Party Services Any services required for or contemplated by the performance of the above-referenced services by the Administrator to be provided by unaffiliated third parties (including independent auditors’ fees and counsel fees) may, if provided for or otherwise contemplated by the Financing Order and if the Issuer deems it necessary or desirable, be arranged by the Issuer or by the Administrator at the direction (which may be general or specific) of the Issuer. Costs and expenses associated with the contracting for such third-party professional services may be paid directly by the Issuer or paid by the Administrator and reimbursed by the Issuer in accordance with Section 2, or otherwise as the Administrator and the Issuer may mutually arrange.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Medical Services Plan 10.1.1 Regular Full-Time and Temporary Full-Time Employees shall be entitled to be covered under the Medical Services Plan commencing the first day of the calendar month following the date of employment.

  • Cloud Services You will not intentionally (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively impacts the Cloud Service’s operation; or (d) submit any information that is not contemplated in the applicable Documentation.

Time is Money Join Law Insider Premium to draft better contracts faster.