BASIC DEVICE ACCESS CONTROL Sample Clauses

BASIC DEVICE ACCESS CONTROL. Insite services will password protect and lockdown access to all managed devices on Insite Xxxxx 0 or Insite Level 3 devices (dependant on device type and manufacturer.) Customers can log calls with the Operations Centre to gain access to the devices for purposes of configuration changes. A change control request must be submitted via the Insite Service Portal for reference and record of all changes requested. Via Networks has requested to own the enable password, this will be monitored on an ongoing basis. If a client has permanent enable access to devices on the network, the Dimension Data can not be held responsible for any unauthorized changes or the effects such changes may have on the output of the network management systems or functionality and behaviour of the network. Via Network will conform the Dimension Data’s change control process, Dimension Data can not be held responsible it Via Network does not conform the change control process.
AutoNDA by SimpleDocs

Related to BASIC DEVICE ACCESS CONTROL

  • Access Control Landlord shall be the sole determinant of the type and amount of any access control or courtesy guard services to be provided to the Project, if any. IN ALL EVENTS, LANDLORD SHALL NOT BE LIABLE TO TENANT, AND TENANT HEREBY WAIVES ANY CLAIM AGAINST LANDLORD, FOR (I) ANY UNAUTHORIZED OR CRIMINAL ENTRY OF THIRD PARTIES INTO THE PREMISES, THE BUILDING OR THE PROJECT, (II) ANY DAMAGE TO PERSONS, OR (III) ANY LOSS OF PROPERTY IN AND ABOUT THE PREMISES, THE BUILDING OR THE PROJECT, BY OR FROM ANY UNAUTHORIZED OR CRIMINAL ACTS OF THIRD PARTIES, REGARDLESS OF ANY ACTION, INACTION, FAILURE, BREAKDOWN, MALFUNCTION AND/OR INSUFFICIENCY OF THE ACCESS CONTROL OR COURTESY GUARD SERVICES PROVIDED BY LANDLORD, IF ANY. Tenant shall provide such supplemental security services and shall install within the Premises such supplemental security equipment, systems and procedures as may reasonably be required for the protection of its employees and invitees, provided that Tenant shall coordinate such services and equipment with any security provided by Landlord. The determination of the extent to which such supplemental security equipment, systems and procedures are reasonably required shall be made in the sole judgment, and shall be the sole responsibility, of Tenant. Tenant acknowledges that it has neither received nor relied upon any representation or warranty made by or on behalf of Landlord with respect to the safety or security of the Premises or the Project or any part thereof or the extent or effectiveness of any security measures or procedures now or hereafter provided by Landlord, and further acknowledges that Tenant has made its own independent determinations with respect to all such matters.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Site Access The Buyer agrees to RELEASE, INDEMNIFY AND HOLD HARMLESS the Seller Indemnitees from and against the entirety of any Adverse Consequences that are suffered by the Seller Indemnitees arising out of, resulting from or relating to any field visit or other due diligence activities relating to any performance of the Diligence Activities to the extent caused by acts or omissions of any Buyer Party or Buyer Diligence Representative, even if such Adverse Consequences arise out of or result from, solely or in part, the sole, active, passive, concurrent or comparative negligence, strict liability or other fault or violation of Law of or by the Seller Indemnitees, except Adverse Consequences to the extent resulting from the gross negligence or willful misconduct of the Seller Indemnitees.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Technology Access Fee In consideration of the licenses and rights granted to Regado herein, Regado shall, as of the date immediately preceding the closing (the “Closing”) of the first equity financing of Regado in which Regado is assigned a pre-money valuation of not less than [***] dollars ($[***]), issue to Archemix fully-paid and non-assessable shares of common stock of Regado equal to [***] percent ([***]%) of the total number of equity shares of Regado, on a fully diluted basis, immediately prior to the issuance of shares at the Closing. Regado shall deliver written notice of the Closing to Archemix at least [***] business days prior to such Closing in accordance with the notice provisions contained in Section 14.1 of this Agreement. Archemix and Regado shall enter into such agreements relating to the issuance of the common stock as are customary under such circumstances. For the purpose of this Agreement, “fully diluted basis” shall mean the aggregate of (a) the number of shares of common stock issued and outstanding on the determination date, (b) the number of shares of common stock issuable upon exercise, exchange or conversion of all exercisable, exchangeable or convertible securities outstanding on the determination date, assuming such securities were exercised, exchanged or converted on the determination date (without regard to whether such securities are actually exercisable, exchangeable or convertible on the determination date) and (c) the number of shares of common stock issuable pursuant to any other obligation or agreement of, or right granted by, Regado, whether vested or unvested, contingent or otherwise.

  • Remote Access The ISP will restrict remote access to BNY Mellon systems to authorized users using multifactor authentication or equivalent safeguard, and will require such access to be logged.

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

Time is Money Join Law Insider Premium to draft better contracts faster.