Access, Intervention, Transfer and Separation Control Sample Clauses

Access, Intervention, Transfer and Separation Control. (a) U-Visit will maintain documented security architecture of networks managed by U-Visit in its operation of the Service. U-Visit will separately review such network architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, for compliance with its secure segmentation, isolation, and defense in depth standards prior to implementation. U-Visit may use wireless networking technology in its maintenance and support of the Service and associated components. Such wireless networks, if any, will be encrypted and require secure authentication and will not provide direct access to Service networks. Service networks do not use wireless networking technology. (b) U-Visit will maintain measures for a Service that are designed to logically separate and prevent Customer Personal Data from being exposed to or accessed by unauthorized persons. (c) To the extend described in the relevant Agreement Documents, U-Visit will encrypt Customer Personal Data not intended for public or unauthenticated viewing when transferring Customer Personal Data over public networks and enable use of a cryptographic protocol, such as HTTPS, SFTP, and FTPS, for secure transfer of Customer Personal Data to and from the Service over public networks. (d) U-Visit will encrypt Customer Personal Data at rest when specified in Agreement Documents. If the Service includes management of cryptographic keys, U-Visit will maintain documented procedures for secure key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use. (e) If U-Visit requires access to Customer Personal Data, U-Visit will restrict and limit such access to least level required to provide and support the Service. Such access, including administrative access to any underlying components (privileged access), will be individual, role based, and subject to approval and regular validation by authorized U-Visit personnel following the principles of segregation of duties. U-Visit will maintain measures to identify and remove redundant and dormant accounts with privileged access and will promptly revoke such access upon the account owner’s separation or request of authorized U-Visit personnel, such as the account owner’s manager. (f) Consistent with industry standard practices, and to the extent natively supported by each component managed by U-Visit within the Service, U-Visit will maintain technical measures enfor...
AutoNDA by SimpleDocs
Access, Intervention, Transfer and Separation Control a. The Supplier will maintain a documented security architecture for Components. The Supplier will separately review such security architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, for compliance with its secure segmentation, isolation, and defense-in-depth standards prior to implementation. b. The Supplier may use wireless networking technology in its maintenance and support of the Supplier Services and associated Components. Such wireless networks, if any, will be encrypted and require secure authentication and will not provide direct access to the Supplier Cloud Services networks. The Supplier Cloud Services networks do not use wireless networking technology. c. The Supplier will maintain measures for the Supplier Service that are designed to logically separate and prevent Content from being exposed to or accessed by unauthorized persons. The Supplier will maintain appropriate isolation of its production and non-production environments, and, if Content is transferred to a non -production environment, for example to reproduce an error at the Buyer's request, security and privacy protections in the non -production environment will be equivalent to those in production. d. The Supplier will encrypt Content not intended for public or unauthenticated viewing when transferring Content over public networks and enable use of a cryptographic protocol, such as HTTPS, SFTP, or FTPS, for the Buyer’s secure transfer of Content to and from the Supplier Services over public networks. e. The Supplier will encrypt Content at rest if and as specified in the Supplier Services Document. If the Supplier Service includes management of cryptographic keys, the Supplier will maintain documented procedures for secure key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use. f. If the Supplier requires access to Content to provide the Supplier Services, and if such access is managed by the Supplier, the Supplier will restrict access to the minimum level required. Such access, including administrative access to any underlying Components (privileged access), will be individual, role-based, and subject to approval and regular validation by authorized the Supplier personnel following the principles of segregation of duties. The Supplier will maintain measures to identify and remove redundant and dormant accounts with privileged access and will ...
Access, Intervention, Transfer and Separation Control a. IBM will maintain a documented security architecture for Components. IBM will separately review such security architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, for compliance with its secure segmentation, isolation, and defense-in-depth standards prior to implementation. b. IBM may use wireless networking technology in its maintenance and support of the IBM Services and associated Components. Such wireless networks, if any, will be encrypted and require secure authentication and will not provide direct access to IBM Cloud Services networks. IBM Cloud Services networks do not use wireless networking technology. c. IBM will maintain measures for an IBM Service that are designed to logically separate and prevent Content from being exposed to or accessed by unauthorized persons. IBM will maintain appropriate isolation of its production and non - production environments, and, if Content is transferred to a non -production environment, for example to reproduce an error at Client's request, security and privacy protections in the non -production environment will be equivalent to those in production. d. IBM will encrypt Content not intended for public or unauthenticated viewing when transferring Con tent over public networks and enable use of a cryptographic protocol, such as HTTPS, SFTP, or FTPS, for Client's secure transfer of Content to and from the IBM Services over public networks. e. IBM will encrypt Content at rest if and as specified in an IBM Services Document. If an IBM Service includes management of cryptographic keys, IBM will maintain documented procedures for secure key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use. f. If IBM requires access to Content to provide the IBM Services, and if such access is managed by IBM, IBM will restrict access to the minimum level required. Such access, including administrative access to any underlying Components (privileged access), will be individual, role-based, and subject to approval and regular validation by authorized IBM personnel following the principles of segregation of duties. IBM will maintain measures to identify and remove redundant and dormant accounts with privileged access and will promptly revoke such access upon the account owner's separation or upon the request of authorized IBM personnel, such as the account owner's manager. g. Consistent with in...
Access, Intervention, Transfer and Separation Control. 5.1 Documented security architecture of networks managed by or on behalf of Acoustic in its operation of the SaaS Product will be maintained. Such network architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, will be reviewed for compliance with secure segmentation, isolation, and defense-in-depth standards prior to implementation. SaaS Product networks do not use wireless-networking technology. Wireless-networking technology may be used in the maintenance and support of the SaaS Product and associated Components. Such wireless networks, if any, will be encrypted, will require secure authentication, and will not provide direct access to SaaS Product networks. 5.2 Measures that are designed to logically separate and prevent Content from being exposed to or accessed by unauthorized persons will be maintained for each SaaS Product. Appropriate isolation of its production and non-production environments will be maintained, and, if Content is transferred to a non-production environment, for example in order to reproduce an error at Partner's request, security and privacy measures designed to provide the same level of protection as in the production environment will be maintained in the non-production environment. 5.3 To the extent described in the relevant Acoustic Documentation, Content not intended for public or unauthenticated viewing will be encrypted when transferred over public networks, and the SaaS Product shall enable use of a cryptographic protocol, such as HTTPS or SFTP, for Partner's secure transfer of Content to and from the SaaS Product over public networks. 5.4 Content will be encrypted at rest when and as specified in the relevant Acoustic Documentation. If the SaaS Product includes management of cryptographic keys, documented procedures will be maintained for secure key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use. 5.5 If access to Content is required, it will be restricted to the minimum level required. Such access, including administrative access to any underlying Components (“Privileged Access”), will be individual, role- based, and subject to approval and regular validation by authorized personnel following the principles of segregation of duties. Adequate measures will be maintained to identify and remove redundant and dormant accounts with Privileged Access and such Privileged Access will promp...
Access, Intervention, Transfer and Separation Control. (a) Pindrop will maintain measures for Pindrop-Controlled Systems that are designed to logically separate and prevent Company’s Confidential Information stored within Pindrop-Controlled Systems from being exposed to or accessed by unauthorized persons. Pindrop will maintain isolation of its production and non-production environments, and, if Company’s Confidential Information is transferred to a non- production environment, for example to reproduce an error at Company’s request, security and privacy protections in the non-production environment will be equivalent to those in production. (b) Pindrop will encrypt Company’s Confidential Information that is subject to long-term storage within Pindrop-Controlled Systems and when Company’s Confidential Information is transmitted by Pindrop over public networks. Pindrop will maintain documented procedures for encryption key generation, issuance, distribution, storage, rotation, revocation, recovery, backup, destruction, access, and use. To the extent that encryption is impractical, Pindrop will use compensating controls designed to protect Company’s Confidential Information. (c) If Pindrop requires access to Company’s Confidential Information that is stored within Pindrop-Controlled Systems, and if such access is managed by Pindrop, Pindrop will deploy measures designed to restrict access to the minimum level required. Such access, including, without limitation, administrative access, will be individual, role- based, and subject to approval and regular validation by authorized Pindrop personnel following the principles of segregation of duties. Pindrop will maintain measures to identify and remove redundant and dormant accounts with privileged access and will promptly revoke such access upon the account owner’s separation or upon the request of authorized Pindrop personnel, such as the account owner’s manager. (d) For Pindrop-Controlled Systems, Pindrop will: (i) monitor and periodically test the Pindrop-Controlled Systems to assess the effectiveness of the Security Policy; (ii) maintain technical measures enforcing timeout of inactive sessions, lockout of accounts after multiple sequential failed login attempts, strong password or passphrase authentication, and password change frequency; (iii) monitor use of privileged access and maintain security information and event management measures designed to: (1) identify unauthorized access, use or tampering; (2) facilitate a timely and appropriate response, and (3) en...

Related to Access, Intervention, Transfer and Separation Control

  • Project Management Plan Developer is responsible for all quality assurance and quality control activities necessary to manage the Work, including the Utility Adjustment Work. Developer shall undertake all aspects of quality assurance and quality control for the Project and Work in accordance with the approved Project Management Plan and

  • Files Management and Record Retention relating to Grantee and Administration of this Agreement a. The Grantee shall maintain books, records, and documents in accordance with generally accepted accounting procedures and practices which sufficiently and properly reflect all expenditures of funds provided by Florida Housing under this Agreement. b. Contents of the Files: Grantee must maintain files containing documentation to verify all funds awarded to Grantee in connection with this Agreement, as well as reports, records, documents, papers, letters, computer files, or other material received, generated, maintained or filed by Grantee in connection with this Agreement. Grantee must also keep files, records, computer files, and reports that reflect any compensation it receives or will receive in connection with this Agreement.

  • Application of this Revenue Sharing Agreement to Notes The terms of this Revenue Sharing Agreement shall apply to each Note as if the terms of this Revenue Sharing Agreement were fully set forth in each Note.

  • Consideration of Criminal History in Hiring and Employment Decisions 10.14.1 Contractor agrees to comply fully with and be bound by all of the provisions of Chapter 12T, “City Contractor/Subcontractor Consideration of Criminal History in Hiring and Employment Decisions,” of the San Francisco Administrative Code (“Chapter 12T”), including the remedies provided, and implementing regulations, as may be amended from time to time. The provisions of Chapter 12T are incorporated by reference and made a part of this Agreement as though fully set forth herein. The text of the Chapter 12T is available on the web at xxxx://xxxxx.xxx/olse/fco. Contractor is required to comply with all of the applicable provisions of 12T, irrespective of the listing of obligations in this Section. Capitalized terms used in this Section and not defined in this Agreement shall have the meanings assigned to such terms in Chapter 12T. 10.14.2 The requirements of Chapter 12T shall only apply to a Contractor’s or Subcontractor’s operations to the extent those operations are in furtherance of the performance of this Agreement, shall apply only to applicants and employees who would be or are performing work in furtherance of this Agreement, and shall apply when the physical location of the employment or prospective employment of an individual is wholly or substantially within the City of San Francisco. Chapter 12T shall not apply when the application in a particular context would conflict with federal or state law or with a requirement of a government agency implementing federal or state law.

  • Verizon OSS Services Access to Verizon Operations Support Systems functions. The term “Verizon OSS Services” includes, but is not limited to: (a) Verizon’s provision of ECI Usage Information to ECI pursuant to Section 8.3 of this Attachment; and, (b) “Verizon OSS Information”, as defined in Section 8.1.4 of this Attachment.

  • Administrative Services Agreement The Administrative Services Agreement has been duly authorized, executed and delivered by the Company and is a valid and binding agreement of the Company, enforceable against the Company in accordance with its terms except as the enforceability thereof may be limited by bankruptcy, insolvency, or similar laws affecting creditors’ rights generally from time to time in effect and by equitable principles of general applicability.

  • Construction Management Plan Contractor shall prepare and furnish to the Owner a thorough and complete plan for the management of the Project from issuance of the Proceed Order through the issuance of the Design Professional's Certificate of Material Completion. Such plan shall include, without limitation, an estimate of the manpower requirements for each trade and the anticipated availability of such manpower, a schedule prepared using the critical path method that will amplify and support the schedule required in Article 2.1.5 below, and the Submittal Schedule as required in Article 2.2.3. The Contractor shall include in his plan the names and resumés of the Project Superintendent, Project Manager and the person in charge of Safety.

  • TRAINING AND EMPLOYEE DEVELOPMENT 9.1 The Employer and the Union recognize the value and benefit of education and training designed to enhance an employee’s ability to perform their job duties. Training and employee development opportunities will be provided to employees in accordance with Employer policies and available resources. 9.2 Attendance at employer-required training will be considered time worked. The Employer will make reasonable attempts to schedule employer-required training during an employee’s regular work shift. The Employer will pay the registration and associated travel costs in accordance with Article 23, Travel, for employer-required training.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Project Manager, County The County shall appoint a Project Manager to act as liaison between the County and the Subrecipient during the term of this Contract. The County’s Project Manager shall coordinate the activities of the County staff assigned to work with the Subrecipient.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!