Access to Vendor Systems Sample Clauses

Access to Vendor Systems. If Contract Personnel is granted Access to Vendor Systems, the Vendor shall: ensure each individual has a unique user identification and password known only to such individual for his/her sole use. promptly provide to TSP such reports as TSP shall from time to time require,, concerning the Vendor’s use and security of access to Vendor Systems. allow Access only to the minimum extent required to enable the Contract Personnel perform their duties. allow Access using a secure login process. establish and implement formal procedures to control the allocation and de-allocation of Access rights. ensure that the allocation and use of enhanced privileges and access to sensitive tools and facilities in Vendor Systems are controlled and limited to only those users who have a business need. ensure that the allocation of user passwords to Vendor Systems that hold or access TSP Information is controlled through a formal auditable management process. conduct regular reviews of user ids and their Access rights. provide processes to demonstrate that remote and home working activities are only permitted where Authorised by TSP and subject to appropriate security controls within the Vendor’s organisation including but not limited to remote Access by users being subject to strong authentication. demonstrate that users follow security best practice in the management of their passwords. implement a password management system which provides a secure and effective interactive facility that ensures quality passwords. ensure that user sessions are terminated after a defined period of inactivity. ensure that audit logs are generated to record user activity and security-relevant events and securely managed and retained with nil ability on the part of the Vendor to allow any un-authorised access or amendment to the audit logs. Such audit logs must be maintained for future reference for a period of at least one year. ensure that monitoring of audit and event logs and analysis reports for anomalous behaviour and/or attempted unauthorised access are performed by Vendor’s staff independent of those users being monitored. make available audit logs where required by TSP for review. ensure all systems holding, processing or accessing TSP Information shall be hardened to TSP standards (Note to Buyer: If in doubt, please contact TSP Security). ensure that to the extent possible, development, test and live environments are segregated from each other and the other work areas in Vendor buildings...
AutoNDA by SimpleDocs
Access to Vendor Systems. 6.1 If Contract Personnel is granted Access to Vendor Systems, the Vendor shall: a) ensure each individual has a unique user identification and password known only to such individual for his/her sole use. b) promptly provide to TSP such reports as TSP shall from time to time require,, concerning the Vendor’s use and security of access to Vendor Systems. c) allow Access only to the minimum extent required to enable the Contract Personnel perform their duties. d) allow Access using a secure login process. e) establish and implement formal procedures to control the allocation and de-allocation of Access rights. f) ensure that the allocation and use of enhanced privileges and access to sensitive tools and facilities in Vendor Systems are controlled and limited to only those users who have a business need. g) ensure that the allocation of user passwords to Vendor Systems that hold or access TSP Information is controlled through a formal auditable management process. h) conduct regular reviews of user ids and their Access rights. i) provide processes to demonstrate that remote and home working activities are only permitted where Authorised by TSP and subject to appropriate security controls within the Vendor’s organisation including but not limited to remote Access by users being subject to strong authentication. j) demonstrate that users follow security best practice in the management of their passwords. k) implement a password management system which provides a secure and effective interactive facility that ensures quality passwords. l) ensure that user sessions are terminated after a defined period of inactivity. m) ensure that audit logs are generated to record user activity and security-relevant events and securely managed and retained with nil ability on the part of the Vendor to allow any un-authorised access or amendment to the audit logs. Such audit logs must be maintained for future reference for a period of at least one year. n) ensure that monitoring of audit and event logs and analysis reports for anomalous behaviour and/or attempted unauthorised access are performed by Vendor’s staff independent of those users being monitored. o) make available audit logs where required by TSP for review. p) ensure all systems holding, processing or accessing TSP Information shall be hardened to TSP standards (Note to Buyer: If in doubt, please contact TSP Security). q) ensure that to the extent possible, development, test and live environments are segregated from ...

Related to Access to Vendor Systems

  • Member Access to Vendor Proposal Notwithstanding any other information provided in this solicitation or Vendor designation of certain documentation as confidential or proprietary, Vendor’s acceptance of this TIPS Contract constitutes Vendor’s consent to the disclosure of Vendor’s comprehensive proposal, including any information deemed confidential or proprietary, to TIPS Members. The proposing Vendor agrees that TIPS shall not be responsible or liable for any use or distribution of information or documentation by TIPS Members or any other party. By submitting this proposal, Vendor certifies the foregoing. If the vendor is awarded a contract with TIPS under this solicitation, the vendor agrees to make any Choice of Law clauses in any contract or agreement entered into between the awarded vendor and with a TIPS member entity to read as follows: "Choice of law shall be the laws of the state where the customer resides" or words to that effect. Agreed In the event of litigation or use of any dispute resolution model when resolving disputes with a TIPS member entity as a result of a transaction between the vendor and TIPS or the TIPS member entity, the Venue for any litigation or other agreed upon model shall be in the state and county where the customer resides unless otherwise agreed by the parties at the time the dispute resolution model is decided by the parties. Agreed Texas and other states restrict by law or state Constitution the ability of a governmental entity to indemnify others. TIPS requires that any contract entered into between a vendor and TIPS or a TIPS Member as a result of an award under this Solicitation limit the requirement that the Customer indemnify the Vendor by either eliminating any such indemnity requirement clauses in any agreements, contracts or other binding documents OR by prefacing all indemnity clauses required of TIPS or the TIPS Member entity with the following: "To the extent permitted by the laws or the Constitution of the state where the customer resides, ". Agreed

  • Member Access to Vendor Proposal Notwithstanding any other information provided in this solicitation or Vendor designation of certain documentation as confidential or proprietary, Vendor’s acceptance of this TIPS Contract constitutes Vendor’s consent to the disclosure of Vendor’s comprehensive proposal, including any information deemed confidential or proprietary, to TIPS Members. The proposing Vendor agrees that TIPS shall not be responsible or liable for any use or distribution of information or documentation by TIPS Members or any other party. By submitting this proposal, Vendor certifies the foregoing.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Properties Subject to the rights of Tenants, Borrower shall permit agents, representatives and employees of Lender to inspect the Properties or any part thereof at reasonable hours upon reasonable advance notice.

  • Access to Facilities Each of the Company and each of its Subsidiaries will permit any representatives designated by the Purchaser (or any successor of the Purchaser), upon reasonable notice and during normal business hours, at such person's expense and accompanied by a representative of the Company, to: (a) visit and inspect any of the properties of the Company or any of its Subsidiaries; (b) examine the corporate and financial records of the Company or any of its Subsidiaries (unless such examination is not permitted by federal, state or local law or by contract) and make copies thereof or extracts therefrom; and (c) discuss the affairs, finances and accounts of the Company or any of its Subsidiaries with the directors, officers and independent accountants of the Company or any of its Subsidiaries. Notwithstanding the foregoing, neither the Company nor any of its Subsidiaries will provide any material, non-public information to the Purchaser unless the Purchaser signs a confidentiality agreement and otherwise complies with Regulation FD, under the federal securities laws.

  • Maintaining Records; Access to Properties and Inspections Maintain financial records in accordance with GAAP and, upon reasonable notice, permit any representatives designated by the Administrative Agent or any Lender to visit and inspect the financial records and the properties of the Borrower or any Significant Subsidiary during normal business hours and to discuss the affairs, finances and condition of the Borrower or any Significant Subsidiary with the officers thereof and independent accountants therefor.

  • Access to Property Borrower shall permit agents, representatives and employees of Lender to inspect the Property or any part thereof at reasonable hours upon reasonable advance notice.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Facility 13.1 Each Party shall ensure that its facilities are secured at all times. 13.2 The Customer shall permit and, if the land on which the Facility is located is not owned by Customer, cause such landowner to permit, the Distributor's employees and agents to enter the property on which the Facility is located at any reasonable time. Such access shall be provided for the purposes of inspecting and/or testing the Facility as and when permitted by this Agreement, the Code or the Distributor’s Conditions of Service or as required to ensure the continued safe and satisfactory operation of the Facility, to ensure the accuracy of the Distributor's meters, to establish work protection, or to perform work. 13.3 Any inspecting and/or testing referred to in section 13.2 shall not relieve the Customer from its obligation to operate and maintain the Facility and any related equipment in a safe and satisfactory operating condition and in accordance with this Agreement. 13.4 The Distributor shall have the right to witness any testing done by the Customer of the Facility and, to that end, the Customer shall provide the Distributor with at least fifteen working days advance notice of the testing. 13.5 Notwithstanding section 10.1, where the Distributor causes damage to the Customer's property as part of this access, the Distributor shall pay to the Customer the Customer's reasonable costs of repairing such property or, if such property cannot be repaired, replacing such property. 13.6 Notwithstanding section 10.1, if the Customer has been given access to the Distributor’s property, and if the Customer causes damage to the Distributor’s property as part of that access, the Customer shall pay to the Distributor the Distributor’s reasonable costs of repairing such property or, if such property cannot be repaired, replacing such property.

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!