Access and Security Control Sample Clauses

Access and Security Control. Employees using city or personally-owned devices and related software for access to the City’s network and data will, without exception, use secure data management procedures. The City uses GOOD as its mobile device management application. The GOOD container for iDevices should be the only area considered as secure. In addition:  Confidential City data should never be stored outside of the GOOD container. At a minimum, a 4- digit PIN on the GOOD container should be used, but it is preferred that you password protect the device with a 4-digit PIN.  Prior to initial use or requested use on the City’s network or related infrastructure, all devices must be approved by IT. Devices that are not pre-approved may not be connected to City’s infrastructure. IT reserves the right to refuse, by physical and non-physical means, the ability to connect personal devices to City and City-connected infrastructure. IT will engage in such action if such equipment is being used in a way that puts the City’s systems, data, users, and clients at risk.  Connectivity of all City-owned devices will be centrally managed by the City’s IT Department.  Multi-factor authentication and strong encryption measures or alternative compensating controls to isolate and protect any enterprise data accessed from or stored on the device, where appropriate, will be used.  Android devices will not be allowed to connect to the City’s network due to security issues within the Android operating system.  Although IT will not directly manage personally owned devices, end users, who are approved to use a personal device, are expected to adhere to the same security protocols when connecting to non-City equipment. Failure to do so will result in immediate suspension of all network access privileges to protect the City’s infrastructure.  Only EXEMPT personnel, as approved by their Department Head, will be allowed to utilize personally owned iDevices. All costs related to this device are the sole responsibility of end-user.  Any device that is being used to store City data must adhere to the authentication requirements of the IT Department. In addition, all hardware security configurations must be pre-approved by the IT Department before any enterprise data-carrying device can be connected to the City’s network.  IT will manage security policies, network, application, and data access centrally using whatever technology solutions it deems suitable. Any attempt to contravene or bypass that security im...
AutoNDA by SimpleDocs

Related to Access and Security Control

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Collateral and Security Section 10.01.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Collateral and Security Documents The due and punctual payment of the principal of, premium and interest on the Notes when and as the same shall be due and payable, whether on a Payment Date, at the Maturity Date, or by acceleration, repurchase, redemption or otherwise, and interest on the overdue principal of, premium and interest on the Notes to the Holders or the Indenture Trustee under this Indenture, the Notes and the other Security Documents, and all other amounts in respect of the Secured Obligations according to the terms hereunder or thereunder, shall be secured by a security interest in the Collateral as provided in the Security Documents, which define the terms of the Liens that secure the Secured Obligations. The Issuer hereby acknowledges and agrees that the Indenture Trustee holds the Collateral in trust for the benefit of the Holders, pursuant to the terms of the Security Documents. Each Holder, by accepting a Note, consents and agrees (subject to Section 4.11) to the terms of the Security Documents (including the provisions providing for the possession, use, release and foreclosure of Collateral) as the same may be in effect or may be amended from time to time in accordance with their respective terms and this Indenture, and authorizes and directs the Indenture Trustee to enter into the Security Documents and, subject to the provisions of this Indenture, to perform its obligations and exercise its rights thereunder in accordance herewith and therewith. The Issuer shall take any and all actions reasonably required to cause the Security Documents to create and maintain at all times, as security for the Secured Obligations of the Issuer hereunder, a valid and enforceable perfected Lien on all of the Collateral, in favor of the Indenture Trustee for the benefit of the Holders under the Security Documents. The Issuer hereby covenant (A) to perform and observe its obligations under the Security Documents and (B) take any and all commercially reasonable actions (including without limitation the covenants set forth in the Security Documents and in this Article 9) required to cause the Security Documents to create and maintain, as security for the Secured Obligations contained in this Indenture, the Notes and the other Security Documents, valid and enforceable, perfected (except as expressly provided herein or therein) security interests in and on all the Collateral, in favor of the Indenture Trustee, superior to and prior to the rights of all third Persons, and subject to no other Liens, in each case, except as expressly permitted herein or therein. The Issuer shall do or cause to be done, at its sole cost and expense, all such actions and things as may be necessary, or as may be required by the provisions of the Security Documents, to confirm to the Indenture Trustee the security interests in the Collateral contemplated hereby and by the Security Documents, as from time to time constituted, so as to render the Collateral available for the security and benefit of this Indenture and of the Notes secured hereby, according to the intent and purpose herein and therein expressed.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Credit Union Lien and Security Interest To the extent you owe the Credit Union money as a borrower, guarantor, indorser or otherwise, the Credit Union has a lien on any or all of the funds in any account in which you have an ownership interest at the Credit Union, regardless of the source of the funds. The Credit Union may apply these funds in any order to pay off your indebtedness without further notice to you. If the Credit Union chooses not to enforce its lien, the Credit Union does not waive its right to enforce the lien at a later time. In addition, you grant the Credit Union a consensual security interest in your accounts and agree the Credit Union may use the funds from your accounts to pay any debt or amount owed the Credit Union, except obligations secured by your dwelling, unless prohibited by applicable law. All accounts are nonassignable and nontransferable to third parties.

  • Background Screening and Security ‌ All Contractor employees and agents performing work under the Contract must comply with all security and other requirements of the Department.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!