Access categories Sample Clauses

Access categories. The provision of data and documents is governed by the following access categories. The access categories are noted in the respective study descriptions in the data stock catalog. Kategorie 0 Data and documents are released for everyone. Kategorie A Data and documents are released for academic research and teaching. Kategorie B Data and documents are released for academic research and teaching if the results are not published. If publi- cation or further processing of the results is planned, permission must be obtained through the Data Archive. Kategorie C Data and documents are only accessible for academic research and teaching after written permission has been obtained from the data provider. The data archive obtains written permission for this purpose, stating the user and the purpose of the evaluation.
Access categories. There are two categories of Data Center access: "Escorted Access" and "Unescorted Access." The appropriate category of Data Center access applicable to Licensor, its subcontractors, and employees shall be determined by the State.

Related to Access categories

  • Employee Categories All employees fall into one or the other of four principal categories as outlined below.

  • Categories All personnel of the Logistics & Supply Business Unit, within the following work categories and in classifications as enumerated in Article 8.03, are covered by this Agreement. Nothing in this agreement prevents an employee from performing either on a day to day or regular basis, any function or task that is generally performed by any category, provided that the employee is competent to perform the work required. Any efficiencies attained out of this flexibility is not intended to eliminate a category.

  • Employment Categories (a) Employees under this Agreement will be employed in one of the following categories: (i) full-time; (ii) part time; or (iii) casual. (b) At the time of engagement an employer will inform each employee whether they are employed on a full-time, part time or casual basis. An employer may direct an employee to carry out such duties that are within the limits of the employee’s skill, competence and training, consistent with the respective classification.

  • Criminal History Category With regard to determining defendant’s criminal history points and criminal history category, based on the facts now known to the government, defendant’s criminal history points equal zero and defendant’s criminal history category is I.

  • Client Categorisation 4.1. The client understands and accepts that each category of Clients has its individual level of regulative protection acknowledging that Retail Clients have the highest level of protection whereas Professional Clients and Eligible Counterparties are considered to be more experienced, informed, skilled and able to estimate their risk, therefore are provided with a lower level of protection. 4.2. The Company will treat the Client as a Retail Client, Professional Client or Eligible Counterparty, depending on how the Client completes the Application Form and according to the method of categorisation as this method is explained under the title “Client Categorisation” (Appendix II), and by accepting this Agreement the Client accepts application of such method. 4.3. The Client accepts that when categorising the Client and dealing with him, the Company will rely on the accuracy, completeness and correctness of the information provided by the Client in his Application Form and the Client has the responsibility to immediately notify the Company in writing if such information changes. 4.4. The Company has the right to review the Client’s Categorisation and change his Categorisation if this is deemed necessary (subject to Applicable Laws).

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Minimum Customer Support Requirements for TIPS Sales Vendor shall provide timely and commercially reasonable support for TIPS Sales or as agreed to in the applicable Supplemental Agreement.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.