Laserfiche WebLink
5. Sufficiency of Consultant's Work. All work product and all other documents prepared by <br /> Consultant shall be adequate and sufficient to meet the purposes for which they are prepared. <br /> 6. Changes. City may request changes in the scope of services to be provided by Consultant. Any <br /> changes and related fees shall be mutually agreed upon between the parties and subject to a written <br /> amendment to this Agreement. <br /> 7. Consultant's Status. In performing the obligations set forth in this Agreement, Consultant shall <br /> have the status of an independent contractor and Consultant shall not be considered to be an employee of <br /> the City for any purpose. All persons working for or under the direction of Consultant are its agents and <br /> employees and are not agents or employees of City. <br /> 8. Handling of City Data. In the event of a termination of this Agreement, Consultant shall <br /> implement an orderly return of City data in a CSV or another mutually agreeable format at a time agreed <br /> to by the parties and the subsequent secure disposal of City data. During any period of service suspension, <br /> Consultant shall not take any action to intentionally erase any City data for a period of 30 days after the <br /> effective date of termination, unless authorized by City. City shall be entitled to any post-termination <br /> assistance generally made available with respect to the Services; unless a unique data retrieval <br /> arrangement has been established as part of the SLA. Consultant shall securely dispose of all requested <br /> data in all of its forms, such as disk, CD/DVD, backup tape and paper, when requested by City. Data shall <br /> be permanently deleted and shall not be recoverable, according to National Institute of Standards and <br /> Technology(NIST)-approved methods. Certificates of destruction shall be provided to City. <br /> 9. Non-Assignability. The Consultant shall not assign, sublet, or transfer this Agreement or any <br /> interest or obligation in the Agreement without the prior written consent of the City, and then only upon <br /> such terms and conditions as City may set forth in writing. Consultant shall be solely responsible for <br /> reimbursing subcontractors. <br /> Indemnity and Hold Harmless. Consultant shall defend, indemnify, and hold harmless,the City and <br /> its officers, agents and employees from and against all claims, losses, damage, injury, and liability for damages <br /> to the extent arising from, or alleged to have arisen from, errors, omissions, negligent or wrongful acts of the <br /> Consultant in the performance of its services under this Agreement, regardless of whether the City has <br /> reviewed or approved the work or services which has given rise to the claim, loss,damage, injury or liability <br /> for damages. Consultant shall defend, indemnify, and hold harmless, the City and its officers,agents and <br /> employees from and against all claims, losses, damage, injury, and liability for damages to the extent arising <br /> from, or alleged to have arisen from allegation that Consultant's Software infringes a patent, copyright, or any <br /> right of a third party or constitutes misuse or misappropriation of a trade secret or any other right in intellectual <br /> property, the Consultant will hold the City harmless and defend such action at Consultant's own expense. This <br /> indemnification shall extend for a reasonable period of time after completionof the project as well as during <br /> the period of actual performance of services under this Agreement. The City's acceptance of the insurance <br /> certificates required under this Agreement does not relieve the Consultant from its obligation under this <br /> paragraph. <br /> 10. Cyber Security Incident. In the event a data breach occurs with respect to City Data, or user <br /> accounts, Consultant shall immediately notify the appropriate City contact by telephone in accordance <br /> with the agreed upon security plan or security procedures if it reasonably believes there has been a security <br />