Deactivation Computershare applications shall automatically deactivate a User ID after a specified number of unsuccessful log-in attempts. Sessions must be restricted or timed out after a defined period of inactivity and require Users to re-authenticate. User IDs for Computershare Personnel with access to Customer Confidential Information shall be deactivated immediately upon changes in job responsibilities that render such access unnecessary, or upon termination of employment.
Activation We will notify the Xxxxxx of your request to receive electronic billing information. The presentment of your first electronic bill may vary from Xxxxxx to Xxxxxx and may take up to sixty (60) days, depending on the billing cycle of each Xxxxxx. While your electronic bill feature is being activated it is your responsibility to keep your accounts current. Each electronic Xxxxxx reserves the right to accept or deny your request to receive electronic bills.
Service Activation For new customers - the services are activated immediately after successful processing of payment and our fraud detection software approves the order. The payment verification procedure is obligatory and if we fail to approve a transaction within 48 hours of the payment submission, the funds will be credited back to the payer and the order will be cancelled. Free Trials - All free trial orders are manually processed. If we deem your order to be suspicious or high risk, we will notify you and request additional information before process the order. Failure to comply with our request for more information will result in cancellation of the order. For existing customers - the services for existing customers, including upgrade services and renewals, are activated immediately after our Sales Department receives the according service payment.
Subprocessing The data importer shall not subcontract any of its processing operations performed on behalf of the data exporter under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it shall do so only by way of a written agreement with the subprocessor which imposes the same obligations on the subprocessor as are imposed on the data importer under the Clauses. Where the subprocessor fails to fulfil its data protection obligations under such written agreement the data importer shall remain fully liable to the data exporter for the performance of the subprocessor's obligations under such agreement.
Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:
STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.
Electrical appliance safety The Hirer shall ensure that any electrical appliances brought by them to the premises and used there shall be safe, in good working order, and used in a safe manner in accordance with the Electricity at Work Regulations 1989. Where a residual circuit breaker is provided the hirer must make use of it in the interests of public safety.
The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.
Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.
Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.