Access and Security Control Sample Clauses

Access and Security Control. Employees using city or personally owned devices and related software for access to the City’s network and data will, without exception, use secure data management procedures. The City uses Blackberry as its mobile device management application. The Blackberry container for iDevices should be the only area considered as secure. In addition:  Confidential City data should never be stored outside of the Blackberry container. At a minimum, a 4-digit PIN on the Blackberry container should be used, but it is preferred that your password protect the device with a 4-digit PIN.  Prior to initial use or requested use on the City’s network or related infrastructure, all devices must be approved by I.T. Devices that are not pre-approved may not be connected to City’s infrastructure. I.T. reserves the right to refuse, by physical and non-physical means, the ability to connect personal devices to City and City-connected infrastructure. I.T. will engage in such action if such equipment is being used in a way that puts the City’s systems, data, users, and clients at risk.  Connectivity of all City-owned devices will be centrally managed by the City’s I.T. Department.  Multi-factor authentication and strong encryption measures or alternative compensating controls to isolate and protect any enterprise data accessed from or stored on the device, where appropriate, will be used.  Android devices will not be allowed to connect to the City’s network due to security issues within the Android operating system.  Although I.T. will not directly manage personally owned devices, end users, who are approved to use a personal device, are expected to adhere to the same security protocols when connecting to non-City equipment. Failure to do so will result in immediate suspension of all network access privileges to protect the City’s infrastructure.  Only EXEMPT personnel, as approved by their Department Head, will be allowed to utilize personally owned iDevices. All costs related to this device are the sole responsibility of end-user.  Any device that is being used to store City data must adhere to the authentication requirements of the
AutoNDA by SimpleDocs

Related to Access and Security Control

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Passwords and Security You acknowledge that you will be the only authorized user of Firstrade Securities Inc.'s Electronic Services for your account(s). You will be fully responsible for the confidentiality and use of your user name(s) and password (s) and you agree that you will be fully and solely responsible for all activities, including brokerage transactions, which arise from the use of your user name (s) or password(s) (except as provided for in paragraph 5 below). You also agree that you will be fully and solely responsible for all activities, including brokerage transactions, which arise from your authorization to link your brokerage account(s) to any other Firstrade Securities Inc. account(s). You acknowledge that we may tape record conversations with you, whether in person or by telephone, for purposes of verification and you consent to such recording.

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Credit Union Lien and Security Interest To the extent you owe the Credit Union money as a borrower, guarantor, indorser or otherwise, the Credit Union has a lien on any or all of the funds in any account in which you have an ownership interest at the Credit Union, regardless of the source of the funds. The Credit Union may apply these funds in any order to pay off your indebtedness without further notice to you. If the Credit Union chooses not to enforce its lien, the Credit Union does not waive its right to enforce the lien at a later time. In addition, you grant the Credit Union a consensual security interest in your accounts and agree the Credit Union may use the funds from your accounts to pay any debt or amount owed the Credit Union, except obligations secured by your dwelling, unless prohibited by applicable law. All accounts are nonassignable and nontransferable to third parties.

Time is Money Join Law Insider Premium to draft better contracts faster.