Access to e-CODEX configuration Sample Clauses

Access to e-CODEX configuration. The chapters above have pointed out, how e-CODEX applies security measures by applying security standards to the channel from one e-CODEX Access Point to another. Therefore, the route of an e- CODEX message can be considered secured. However, security breaches cannot only happen during the transportation of messages. They can also happen when setting up e-CODEX Access Points. The communication between e-CODEX Access Points needs prior configuration. This configuration is done via so-called pModes (Processing 5 xxxxx://xxx.xxxxx-xxxx.xxx/committees/tc_home.php?wg_abbrev=wss 6 xxxxx://xxxxx.xxxx.xxx/html/rfc5280 7 xxxxx://xx.xxxxxxxxx.xxx/wiki/Associated_Signature_Containers#ASiC_Simple_(ASiC-S) and xxxxx://xxx.xxxx.xxx/deliver/etsi_en/319100_319199/31916201/01.01.01_60/en_31916201v01010 1p.pdf Modes). Such pModes contain the addressing data, the applied security policy and other information. Also, they contain the trust stores with the public certificates of all participating e- CODEX Access Points. Such pModes are created for each partner’s configuration by a central “Coordinator for Configuration” (CfC) using a Configuration Management Tool (CMT). The access to this CMT is provided and restricted to each partner only upon personal and individual request. The administrative access is restricted to CFCs. Currently, the Ministry of Justice of North-Rhine-Westphalia (and its IT provider XX.XXX) serve as CfC, since they were the Coordinator of all relevant e-CODEX projects. This task will be handed over in the future to eu-LISA8 as the future competent authority for the maintenance of e-CODEX.
AutoNDA by SimpleDocs

Related to Access to e-CODEX configuration

  • Configuration The configuration for the Purchase Right Aircraft will be the Detail Specification for Model 767-3S2F aircraft at the revision level in effect at the time of the Supplemental Agreement. Such Detail Specification will be revised to include (i) changes required to obtain required regulatory certificates and (ii) other changes as mutually agreed upon by Boeing and Customer.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access to Work District representatives shall at all times have access to the Work, wherever it is, in preparation or in progress. Contractor shall provide safe and proper facilities for such access.

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Technical Specification As enumerated in Special Conditions of Contract/Scope of Work/attached Drawing/ Details/Schedule of Rates.

  • Specification and Service Levels The Specification sets out the Services that the Contractor has undertaken to provide. The Specification includes Service Levels setting out particular levels of service that the Contractor has undertaken to meet.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

Time is Money Join Law Insider Premium to draft better contracts faster.