Authorized Access. Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.
Authorized Access. 10.2.5.1 Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.
10.2.5.2 Access to any internet-based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 Only authorized staff should maintain, move or modify County network systems and components.
10.2.5.7 If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 Licensing requirements and copyright laws must be adhered to.
10.2.5.9 All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 Security lifecycle practices must be practiced in all development cycles.
10.2.5.11 Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 Applications should employ Single Sign On technology.
10.2.5.13 Business critical systems and data must be backed up with periodically validated processes.
Authorized Access. 1. Permit within 10 calendar days of providing notification and at reasonable times, access by authorized representatives of the Department, Federal Grantor Agency, Inspector Generals, Comptroller General of the United States and State Auditor General, or any of their duly authorized representatives, to records, papers, files, documentation and personnel related to this Agreement, to the extent authorized by applicable state or federal law, rule or regulation.
2. Acknowledge the rights of access in this section are not limited to the required retention period. The rights of access will last as long as the records are retained.
3. Cooperate and provide reasonable assistance to authorized representatives of the Department and others when those individuals have access to the Grantee’s grant records.
Authorized Access. Permit upon reasonable notification and at reasonable times, access by authorized representatives of the Department, Federal Grantor Agency, Comptroller General of the United States and State Auditor General, or any of their duly authorized representatives, to records, files and documentation related to this agreement, to the extent authorized by applicable state or federal law, rule or regulation.
Authorized Access. State Street shall have controls that are designed to maintain the logical separation such that access to systems hosting Client Data and/or being used to provide Services to Client will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Client Data.
Authorized Access. The Client shall be the only authorized user of the ETS for the Client’s Account. The Client shall be responsible for the confidentiality and use of the Access Codes. The Client acknowledges and agrees that the Client shall be solely responsible for all Instruction entered through the ETS using the Access Codes and neither GTJAF nor GTJAF’s directors, officers or employees shall have any liability to the Client, or to any other person whose claim may arise through the Client, for any claims with respect to the handling, mishandling or loss of any Instruction.
Authorized Access. If you authorize anyone to access or use your account , you understand that person may access and use the Internet or Mobile Banking service to review all of your account information and make account transactions. Therefore, we are entitled to act on transaction instructions received using your access code and you agree that the use of your access code will have the same effect as your signature authorizing
Authorized Access. Except for emergencies, compelling circumstances, subpoenas, or search warrants, access to surveillance data must be authorized in advance and in writing by the Superintendent/President, Vice President of Administrative Services, Head of Security, Director of Maintenance and Operations, or the Chief Human Resources Officer. This authority may not be delegated to another District employee, except in the case of emergency, compelling circumstances, or compliance with legal requirements noted in paragraph 22.1.5.4, above.
Authorized Access. Client shall be the only authorized user of the Electronic Trading Service for Client’s Account. Client shall be responsible for the confidentiality and use of the Access Codes. Client acknowledges and agrees that Client shall be solely responsible for all Instruction entered through the Electronic Trading Service using the Access Codes and neither CIF nor CIF’s directors, officers or employees shall have any liability to Client, or to any other person whose claim may arise through Client, for any claims with respect to the handling, mishandling or loss of any Instruction.
Authorized Access. The Grantee will permit, upon reasonable notification and at reasonable times, access to all records regarding this Grant Agreement by the Department and other representatives duly authorized by State or Federal law.