Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.
Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.
Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.
User Generated Content 10.1 As a user to this website, You may be allowed to post any User Generated Content (“User Content”) and You agree, by submitting your contribution, you xxxxx XX Group a perpetual, royalty-free, non-exclusive, sublicensable right and license to use, reproduce, edit, modify, adapt, publish, translate, create derivate works from, distribute, perform, play, make available to the public, and exercise all copyright and publicity rights with respect to your contribution worldwide and/or to incorporate your contribution in other works in any media, now known or later developed, for the full terms of any rights that may exist in your contribution. 10.2 You also hereby grant other user of TM Website a non-exclusive license to access your User Content through the access and/or use of TM Website, and to use such User Content only as permitted through the functionality of TM Website. 10.3 You understand and agree that TM may retain and store, but not display, distribute, or perform, server copies of User Content that has been removed or deleted. The above licenses granted to TM, by You in User Content is irrevocable. 10.4 Further to the foregoing paragraph, by submitting your User Content to us, You warrant that:- (a) your User Content is your own original work or have the necessary license, rights, consents, and permissions to use and authorize us to use all patent, trademark, trade secret, copyright or other proprietary rights in and to any and all User Content to enable TM to use of the User Content in the manner required by us and that you have the right to make it available to us for all the purposes specified above; (b) your User Content is not defamatory, threatening, injurious, insulting character, offensive, abusive, offensive on moral, menacing, religious or political grounds, impair your confidentiality obligations; (c) your User Content does not infringe the law; (d) You shall be solely responsible for your own User Content and the consequences of posting or publishing them; (e) You will not submit material that is copyrighted, protected by trade secret or otherwise subject to third party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from their rightful owner to post material and to grant us all of the license rights granted herein; and/or (f) waive any moral rights in your User Content for the purposes of its submission to and publication in TM Website and the purposes specified above. 10.5 You understand that whether or not such User Content is posted, TM does not guarantee any confidentiality with respect to any User Content. TM does not endorse any User Content or any opinion, recommendation, or advice expressed therein, and expressly disclaims any and all liability in connection with User Content. We do not permit activities which will infringe any Intellectual Property Rights including copyright and we will remove all infringing contents and User Content upon notification that such Content or User Content infringes on another’s Intellectual Property Rights. We further reserve the right to remove any Content or User Content without prior notice. 10.6 You understand and agree that we may review and delete any User Content that you posted at any time without notice, without liability and for any reason whatsoever, especially if you breach the terms and conditions herein. 10.7 We reserve the right to investigate and take appropriate legal action, in our sole discretion, against You for the User Content especially if it violates TM policy and report you to the Appropriate Authority.
System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
Program Location A. Unless otherwise agreed upon in writing, the parties acknowledge and agree that the Work of this Agreement will be performed at the following Property address: Ktr Address1 Address2
Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.