Computer System Access Sample Clauses

Computer System Access. The County will provide the SMPD with access to the County’s computer system for law enforcement (the Xxxxxxxx system) and general access to the County’s computer network. Access will be provided to all deputized SMPD officers, and other individuals as approved by the Shawano County Sheriff’s Office on a case- by-case basis. The Tribe recognizes that the County incurs an annual internal cost for granting this access and agrees to reimburse the County actual costs on a quarterly basis (which is anticipated as being approximately $203.73 per user per quarter in 2025. This is based on 6 users.).
AutoNDA by SimpleDocs
Computer System Access. I acknowledge that "Computer System" means a computer, its software, related equipment and communications facilities (if any), and includes computer networks. Further, I acknowledge that any information obtained by access to a GS, Inc. Computer System shall be a part of GS, Inc. Confidential Information as defined herein, and that any access to a GS, Inc. Computer System other than in the course of my regularly assigned tasks as a consultant is unauthorized. I also acknowledge that any use of a GS, Inc. computer other than in respect to my services as a consultant is unauthorized.
Computer System Access. 10.1 From time to time, White Cap may provide Supplier access to proprietary computer systems and technologies owned and operated by White Cap (the “Systems”) to facilitate e-commerce and business-to-business (B2B) transactions. The Systems are to be used only for the business purposes of White Cap. White Cap may periodically monitor all uses of the Systems as allowed by Law. Supplier’s users shall have no expectation of privacy when using the Systems. In order to receive such access, Supplier agrees to the following: White Cap hereby grants Supplier limited, non-transferable access to certain Systems as may be determined by White Cap from time to time in its sole discretion. Supplier accepts the liability of managing its users’ access to the Systems as outlined in this Section 10. Each employee or agent of Supplier having access to the Systems will: (i) be assigned a separate User ID by Supplier and will use only that ID when logging on to the Systems; (ii) log off the Systems immediately upon completion of each session of service; (iii) not allow unauthorized individuals to access the Systems; (iv) keep strictly confidential the User ID and password and all other information that enables such access; (v) not reuse a compromised password (e.g. a password that has become known to anyone else at any time, including in an emergency); (vi) only utilize such access to perform its obligations to White Cap; (vi) comply with White Cap’s encryption requirements or other service policies instituted by White Cap from time to time; (vii) not perform any unauthorized exploring or mining of the Systems; and (viii) only have access to the portion of the Systems necessary to perform Supplier’s obligations. Supplier is solely responsible for obtaining the hardware and software necessary to properly access the Systems. Supplier shall assign an individual working for Supplier that shall act as its Supplier Guardian Point of Contact (“SGPOC”). The SGPOC will be the security liaison between White Cap and Supplier and (i) oversee compliance with the requirements of this Section 10, (ii) manage Supplier’s access to the Systems by granting and removing individual user access and working with White Cap to resolve any Systems-related issues that may arise, (iii) receive notice of security breaches within Supplier’s organization, (iv) coordinate security breach incident response and remedial action, and (v) provide notice, reporting and work within Supplier to undertake other actio...
Computer System Access. The Service Provider will access the Computer System only in accordance with the BCLC Services Manual and will not modify, revise or otherwise change, or allow any other person to modify any aspect of the Computer System in any manner that would or would reasonably be expected to interfere with or compromise the systems, infrastructure, architecture, security, integrity, coding or functionality of the Computer System, any data residing on or being processed by the Computer System, or otherwise adversely impact the Corporation. Without limiting the foregoing, the Service Provider will ensure that: (a) access to the Computer System by the SP Systems is only through the network(s) and means specified in the BCLC Services Manual, and (b) the SP Systems will comply with the BCLC Services Manual. The Service Provider will comply with any testing, security, controls and production requirements as outlined in the BCLC Services Manual. The Service Provider will only remove Corporation Data from the Computer System as expressly permitted by the Corporation or the BCLC Services Manual, and in any event will segregate, physically and logically, all Corporation Data from its own data, including as required by the BCLC Services Manual. In the event of an Information Security Incident, the Service Provider will follow the procedure set out in the BCLC Services Manual.
Computer System Access. 10.1 From time to time, White Cap may provide Supplier access to proprietary computer systems and technologies owned and operated by White Cap (the “Systems”) to facilitate e-commerce and business-to-business (B2B) transactions. The Systems are to be used only for the business purposes of White Cap. White Cap may periodically monitor all uses of the Systems as allowed by Xxx. Supplier’s users shall have no expectation of privacy when using the Systems. In order to receive such access, Supplier agrees to the following: (a) White Cap hereby grants Supplier limited, non-transferable access to certain Systems as may be determined by White Cap from time to time in its sole discretion. Supplier accepts the liability of managing its users’ access to the Systems as outlined in this Section 10. Each employee or agent of Supplier having access to the Systems will: (i) be assigned a separate User ID by Supplier and will use only that ID when logging on to the Systems; (ii) log off the Systems immediately upon completion of each session of service; (iii) not allow unauthorized individuals to access the Systems; (iv) keep strictly confidential the User ID and password and all other information that enables such access; (v) not reuse a compromised password (e.g. a password that has become known to anyone else at any time, including in an emergency); (vi) only utilize such access to perform its obligations to White Cap;
Computer System Access. (1) Bonded Web User shall access DMV’s databases only between the hours of 6:00 a.m. and 6:00 p.m. Pacific Standard Time Monday through Friday excluding California State approved holidays and furloughs. All other hours are prohibited. Updates can be completed periodically during normal working hours. There will be no technical support on weekends, furloughs, and state holidays. (2) Notification regarding when DMV’s system is down for maintenance or update will be sent via electronic mail. (3) Access to the DMV’s IRP vehicle registration and inventory databases shall be controlled by the use of an authentication credentialing system that shall identify, authenticate, and authorize access for each individual user. (4) The Bonded Web User shall notify the Bonded Web User Program Administrator to change, disable, or revoke an individual’s access authorization within one (1) day if any of the following occurs: (a) The individual no longer requires access to the DMV’s IRP vehicle registration and inventory databases; (b) The individual is no longer employed by the Bonded Web User; (c) The individual is suspected of, or has committed an act or acts of unauthorized disclosure or misuse of DMV records; (d) The individual is found to be in noncompliance with DMV’s information security requirements as defined in this Agreement. (5) Each individual user shall be assigned a “unique” user identifier by the authentication credentialing system administrator. (6) The individual user utilizing the authentication credentialing system shall select the password which must consist of eight (8) characters. The system administrator can assign a default password to an authorized individual who has been positively identified to the administrator in order to establish a new access account and user selected password, or when a user selected password has been forgotten and the user must establish a new user selected password. The default password shall not allow the individual to access the DMV’s vehicle registration tilting and inventory databases and shall not be capable of subsequent access, but must require the individual to establish a new selected password for their access. (7) DMV recommends that the individual user does not select a password that is identifiable with the individual by utilizing such elements as their name, initials, social security number or a family member’s name or initials in the password’s construction. (8) Passwords shall not be written down or displayed ...
Computer System Access 
AutoNDA by SimpleDocs

Related to Computer System Access

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!