Access Control of Processing Areas (Physical Sample Clauses

Access Control of Processing Areas (Physical. Web applications, communications and database servers of XXXXxx.xxx are located in secure data centers in Canada, which are operated by iWeb Technologies.
AutoNDA by SimpleDocs
Access Control of Processing Areas (Physical. Web applications, communications and database servers of Platformly are located in secure data centers in the United States, which are operated by DigitalOcean LLC.
Access Control of Processing Areas (Physical. Web applications, communications and database servers of XXXXxx.xxx are located in secure data centers in the United States, which are operated by Digital Ocean LLC.

Related to Access Control of Processing Areas (Physical

  • Access to Customer Data You agree that we may, for the purposes of providing Maintenance and Customer Support and/or for the purpose of otherwise protecting the integrity of the Software, access and/or download your Customer Data on a limited basis.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Traffic Measurement and Billing over Interconnection Trunks 6.1 For billing purposes, each Party shall pass Calling Party Number (CPN) information on at least ninety-five percent (95%) of calls carried over the Interconnection Trunks.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.

  • Interconnection Customer’s Interconnection Facilities Construction The Interconnection Customer’s Interconnection Facilities shall be designed and constructed in accordance with Good Utility Practice. Within one hundred twenty (120) Calendar Days after the Commercial Operation Date, unless the Participating TO and Interconnection Customer agree on another mutually acceptable deadline, the Interconnection Customer shall deliver to the Participating TO and CAISO “as-built” drawings, information and documents for the Interconnection Customer’s Interconnection Facilities and the Electric Generating Unit(s), such as: a one-line diagram, a site plan showing the Large Generating Facility and the Interconnection Customer’s Interconnection Facilities, plan and elevation drawings showing the layout of the Interconnection Customer’s Interconnection Facilities, a relay functional diagram, relaying AC and DC schematic wiring diagrams and relay settings for all facilities associated with the Interconnection Customer's step-up transformers, the facilities connecting the Large Generating Facility to the step-up transformers and the Interconnection Customer’s Interconnection Facilities, and the impedances (determined by factory tests) for the associated step-up transformers and the Electric Generating Units. The Interconnection Customer shall provide the Participating TO and the CAISO specifications for the excitation system, automatic voltage regulator, Large Generating Facility control and protection settings, transformer tap settings, and communications, if applicable. Any deviations from the relay settings, machine specifications, and other specifications originally submitted by the Interconnection Customer shall be assessed by the Participating TO and the CAISO pursuant to the appropriate provisions of this LGIA and the LGIP.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

Time is Money Join Law Insider Premium to draft better contracts faster.