System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
The Performance Improvement Process (a) The Performance Improvement Process will focus on the risks of non- performance and problem-solving. It may include one or more of the following actions: (1) a requirement that the HSP develop and implement an improvement plan that is acceptable to the LHIN; (2) the conduct of a Review; (3) a revision and amendment of the HSP’s obligations; and (4) an in-year, or year end, adjustment to the Funding, among other possible means of responding to the Performance Factor or improving performance. (b) Any performance improvement process begun under a prior service accountability agreement that was not completed under the prior agreement will continue under this Agreement. Any performance improvement required by a LHIN under a prior service accountability agreement will be deemed to be a requirement of this Agreement until fulfilled or waived by the LHIN.
Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.
Transmission and Routing of Exchange Access Traffic PURSUANT TO 251(c)(2) 13 ARTICLE VI MEET-POINT BILLING ARRANGEMENTS 14 ARTICLE VII BLV/BLVI TRAFFIC 16 7.1 Busy Line Verification 16 7.2 Busy Line Verification Interrupt 16 7.3 BLV/BLVI Traffic 16 7.4 BLV/BLVI Compensation 16
Post-Closing Access (a) Each of Seller and Buyer shall, and Buyer shall cause the Company to, preserve and keep all books and records and other information relating to the accounting, legal, Tax, regulatory, business and financial affairs of the Company and the Rolling Mill Business for a period of seven (7) years after the Closing Date (or, in the case of information relating to Taxes, until the expiration of any applicable statute of limitations), or for a longer period if (i) required by Law (including any statute of limitations and applicable extensions thereof) or any Governmental Authority or (ii) reasonably necessary with respect to the prosecution or defense of any audit or other legal or regulatory action that is then pending or threatened so long as the requesting Party has notified the other Party with prior written notice of the need to retain such books, records or information. (b) Following the Closing, for so long as such information is retained by Buyer in accordance with Section 5.8(a), Buyer shall, and shall cause the Company, to permit Seller and its authorized Representatives, at Seller’s sole cost and expense, to have reasonable access and duplication rights during normal business hours, upon reasonable prior written notice to Buyer to the information described in Section 5.8(a) to the extent that such access may be reasonably required in connection with (i) the preparation of any Tax Return, accounting records or with respect to any Tax Claim or similar proceedings, (ii) any Action relating to Seller, the Company or the Rolling Mill Business, (iii) any Governmental Filing or matter (including investigations by Governmental Authorities) or (iv) any other valid legal or business purpose. Notwithstanding the foregoing, Seller shall have no right of access to, and Buyer shall have no obligation to provide, (A) any information if doing so would reasonably be expected to (1) violate any Contract or Law to which Buyer or any of its Affiliates (including the Company) is a party or is subject, (2) result in a loss of the ability to successfully assert a claim of privilege (including the attorney-client and work product privileges), (3) result in the disclosure of any competitively sensitive information of Buyer or of any of its Affiliates (including the Company), or (4) breach a confidentiality or other obligation to a Third Party (provided that Buyer shall use commercially reasonable efforts to obtain the consent of any Third Party with regards to such disclosure), or (B) any consolidated, combined, affiliated or unitary Tax Return which includes Buyer or any of its Affiliates (including the Company) or any Tax-related work papers. (c) Following the Closing, for so long as such information is retained by Seller in accordance with Section 5.8(a), Seller shall permit Buyer and its authorized Representatives, at Buyer’s sole cost and expense, to have reasonable access and duplication rights during normal business hours, upon reasonable prior written notice to Seller, to the information described in Section 5.8(a) to the extent that such access may be reasonably required in connection with (i) the preparation of any Tax Return, accounting records or with any Tax Claim or similar proceedings, (ii) any Action relating to the Company or the Rolling Mill Business, (iii) any Governmental Filing or matter (including investigations by Governmental Authorities) or (iv) any other valid legal or business purpose. Notwithstanding the foregoing, Buyer shall have no right of access to, and Seller shall have no obligation to provide, (A) any information if doing so would reasonably be expected to (1) violate any Contract or Law to which Seller or any of its Affiliates is a party or is subject,
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.
Performance Improvement Plan timely and accurate completion of key actions due within the reporting period 100 percent The Supplier will design and develop an improvement plan and agree milestones and deliverables with the Authority 3.2 The Authority may from time to time make changes to the KPIs measured as set out in paragraph 3.1 above and shall issue a replacement version to the Supplier. The Authority shall give notice In Writing of any such change to the KPIs measured and shall specify the date from which the replacement KPIs must be used for future reports. Such date shall be at least thirty (30) calendar days following the date of the notice to the Supplier.
Gold Open Access Articles May be shared according to the author-selected end-user license and should contain a CrossMark logo, the end user license, and a DOI link to the formal publication on ScienceDirect. Please refer to Elsevier's posting policy for further information.