Administrator and Server Access Sample Clauses

Administrator and Server Access. 9.10.1 Full access to the administrator portal will only be available to a limited number of users. The Operational Manager will maintain a list of these users and will ensure the continuing appropriateness of these configurations. As part of their responsibility for first level support, the Participant will be required to create their own users, assign permissions and delete user accounts when they are no longer needed.
AutoNDA by SimpleDocs

Related to Administrator and Server Access

  • Standard Service Features Ethernet Access allows Customer to terminate single and/or multiple Ethernet Virtual Circuits (EVCs) from Customer equipment onto a single Ethernet Access UNI.

  • Programs and Services Every aspect of the service you provide is considered part of your program, and therefore it must be accessible to individuals with disabilities. This includes parking lots, service counters and spaces, transportation (shuttles, etc.), agendas, flyers, emails, online services, phone calls, meetings, celebrations, classes, recreational activities and more. The guidance in this document is primarily intended to help you provide accessible programs by providing you with the tools to: ▪ survey facilities and identify common architectural barriers for people with disabilities; ▪ identify common ADA compliance problems in your communications and activities; and ▪ remove barriers and fix common ADA compliance problems in these areas. ADA Technical Assistance Materials ADA Update Your programs can be broken into three main categories, (Communications, Facilities, and Activities) which will be covered in more detail below.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • The Program The Program is a comprehensive commercial energy efficiency program that offers financial incentives and financing for qualifying energy efficiency measures in commercial buildings to customers who are property owners, tenants or managers (customers) of ACE in New Jersey. Customers must receive ACE electric delivery service and be in good standing. Incentives are available to customers for the purchase and installation of qualifying energy-efficiency measures at the location where the qualifying project is to be installed. XXX will not offer financial incentives for the same eligible measure to those customers who have received financial incentives or rebates from other ACE energy efficiency programs.

  • Participating Providers To find out if a Provider is a Participating Provider: • Check Our Provider directory, available at Your request; • Call the number on Your ID card; or • Visit our website at xxx.xxxxxx.xxx. The Provider directory will give You the following information about Our Participating Providers: • Name, address, and telephone number; • Specialty; • Board certification (if applicable); • Languages spoken; and • Whether the Participating Provider is accepting new patients.

  • Developer Compensation for Emergency Services If, during an Emergency State, the Developer provides services at the request or direction of the NYISO or Connecting Transmission Owner, the Developer will be compensated for such services in accordance with the NYISO Services Tariff.

  • Participant Information My address is: My Social Security Number is:

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!