Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
Customer Contacts CLEC, or CLEC's authorized agent, are the single point of contact for its End User Customers' service needs, including without limitation, sales, service design, order taking, Provisioning, change orders, training, maintenance, trouble reports, repair, post-sale servicing, Billing, collection and inquiry. CLEC will inform its End User Customers that they are End User Customers of CLEC. CLEC's End User Customers contacting Qwest will be instructed to contact CLEC, and Qwest's End User Customers contacting CLEC will be instructed to contact Qwest. In responding to calls, neither Party will make disparaging remarks about the other Party. To the extent the correct provider can be determined, misdirected calls received by either Party will be referred to the proper provider of Local Exchange Service; however, nothing in this Agreement shall be deemed to prohibit Qwest or CLEC from discussing its products and services with CLEC's or Qwest's End User Customers who call the other Party. 10.1 In the event Qwest terminates Service to CLEC for any reason, CLEC will provide any and all necessary notice to its End User Customers of the termination. In no case will Qwest be responsible for providing such notice to CLEC's End User Customers.
Customer Contact During the delivery phase of a Project Supplier may have direct communication with a Customer, limited solely to those communications necessary to affect provision of Services and/or Deliverables.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Emergency Contact Information Resident must complete and provide to University an emergency contact information form provided by University Housing before Resident will be allowed to move into the Residence Facility.
Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.
System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
Contact If You have any concerns or questions to this Agreement, please contact Us at xxxxxxx@xxxxxxxxxxxx.xxx.
Authorized Contacts LightEdge Solutions provides reliable and secure managed services by requiring technical support and information requests come only from documented, authorized client-organization contacts. Additionally, in compliance with federally regulated CPNI (Customer Proprietary Network Information) rules, a customer contacting LightEdge Solutions to request an add, move, or change and/or to request information on their account, must provide LightEdge representative with customer’s Code Word. Code Word is not required or verified to open trouble tickets related to service issues, however, any subsequent information/updates or authorization of intrusive testing related to the trouble ticket will require the Code Word. Customer shall provide a “contact list” which will contain one (“1”) Administrative contact and may contain up to three (“3”) Technical contacts per service. Administrative and Technical contacts are authorized to request service changes or information, including the contact name, contact e-mail address and contact phone number for each contact but must provide customer Code Word for any CPNI related requests. Requests to change a contact on the list or to change the Code Word must be submitted by the Administrative contact. Requests to replace the Administrative contact shall be submitted via fax to LightEdge on customer company letterhead. All requests are verified per procedure below. Requests for CPNI, configuration information or changes are accepted only from documented, authorized client-organization contacts via e-mail, fax or phone and will require Customer’s Code Word. E-mail and fax requests must be submitted without the Code Word. Customer contact will be called to verify Code Word. E- mail requests that include the Code Word will be denied and the client Administrative Contact will be notified and required to change the Code Word. E-mail and fax requests are verified with a phone call to the documented client contact. Phone call requests must be validated with an e-mail request from a documented client contact.
Operational Contacts Each Interconnection Party shall designate, and provide to each other Interconnection Party contact information concerning, a representative to be responsible for addressing and resolving operational issues as they arise during the term of the Interconnection Service Agreement.