Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.
TOOLS AND CLOTHING 30.1 An employee shall be required to provide himself with the ordinary hand tools of his trade, based on established trade union practices at the time of signing of this Agreement. EPSCA and the Union shall establish an appropriate tool list for each trade. Each Employer will provide, insofar as is practical, separate facilities for storing the tools of each trade, but shall not be held responsible for losses, except as noted hereunder:
Tools and Equipment As established by current practices, the Employer may determine and provide necessary tools, tool allowance, equipment and foul weather gear. The Employer will repair or replace employer-provided tools and equipment if damaged or worn out beyond usefulness in the normal course of business. Employees are accountable for equipment and/or tools assigned to them and will maintain them in a clean and serviceable condition.
UNIFORMS, TOOLS AND EQUIPMENT 23.1 Uniforms The Employer may require employees to wear uniforms. Where required, the Employer will determine and provide the uniform or an equivalent clothing allowance. The Employer will follow their policy regarding the provision and maintenance of required uniforms, specialized clothing and footwear. The cost of normal wear and tear and loss of required uniforms, specialized clothing and footwear due to workplace conditions is the responsibility of the Employer.
Loop Testing/Trouble Reporting 2.1.6.1 Think 12 will be responsible for testing and isolating troubles on the Loops. Think 12 must test and isolate trouble to the BellSouth portion of a designed/non- designed unbundled Loop (e.g., UVL-SL2, UCL-D, UVL-SL1, UCL-ND, etc.) before reporting repair to the UNE Customer Wholesale Interconnection Network Services (CWINS) Center. Upon request from BellSouth at the time of the trouble report, Think 12 will be required to provide the results of the Think 12 test which indicate a problem on the BellSouth provided Loop.
Internal Controls The Company shall maintain a system of internal accounting controls sufficient to provide reasonable assurances that: (i) transactions are executed in accordance with management’s general or specific authorization; (ii) transactions are recorded as necessary in order to permit preparation of financial statements in accordance with GAAP and to maintain accountability for assets; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with existing assets at reasonable intervals and appropriate action is taken with respect to any differences.
Testing/Trouble Reporting 1.15.1 TWTC will be responsible for testing and isolating troubles on Network Elements. TWTC must test and isolate trouble to the AT&T network before reporting the trouble to the Network Elements Customer Wholesale Interconnection Network Services (CWINS) Center. Upon request from AT&T at the time of the trouble report, TWTC will be required to provide the results of the TWTC test which indicate a problem on the AT&T network. Version: 4Q06 Standard ICA 11/30/06
Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.
Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
PERSONAL PROTECTIVE EQUIPMENT, TOOLS AND APPAREL 16.01 The Employer will furnish employees with all necessary personal protective equipment (including safety helmets, safety glasses, gloves etc.) and rain gear if and when required. Said equipment shall remain the property of the Employer. Any worn out safety equipment will be replaced by the Employer upon presentation of the worn equipment. The employees shall be held responsible for loss or improper maintenance of Employer furnished items, including personal protective equipment, rain gear and safety equipment, in which case employees may, at the discretion of the Employer, be subject to disciplinary action.