System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
Emergency Operator Access Registry Operator shall provide bulk access to the zone files for the TLD to the Emergency Operators designated by ICANN on a continuous basis in the manner ICANN may reasonably specify from time to time.
System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.
Account Maintenance Trade Allocations Trade Reporting; (Futures) Daily Trade Checkout Daily Statement Reconciliation
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.
Temporary Safeguard Measures 1. A Contracting Party may adopt or maintain measures not conforming with its obligations under Article 2 relating to cross- border capital transactions and Article 15: (a) in the event of serious balance-of-payments and external financial difficulties or threat thereof; or (b) in cases where, in exceptional circumstances, Movements of capital cause or threaten to cause serious difficulties for macroeconomic management, in particular, monetary and exchange rate policies. 2. Measures referred to in paragraph 1: (a) shall be consistent with the Articles of Agreement of the International Monetary Fund, so long as the Contracting Party taking the measures is a party to the said Articles; (b) shall not exceed those necessary to deal with the circumstances set out in paragraph 1; (c) shall be temporary and shall be eliminated as soon as conditions permit; (d) shall be promptly notified to the other Contracting Party; and (e) shall avoid unnecessary damages to the commercial, economic and financial interests of the other Contracting Party. 3. Nothing in this Agreement shall be regarded as altering the rights enjoyed and obligations undertaken by a Contracting Party as a party to the Articles of Agreement of the International Monetary Fund.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Emergency Access Landlord shall have the right to enter the Premises at any time without notice in the event of an emergency.
General Access BCA agrees to provide Agency with access to the Minnesota Criminal Justice Data Communications Network (CJDN) and those systems and tools which the Agency is authorized by law to access via the CJDN for the purposes outlined in Minn. Stat. § 299C.46.
Implementation of and Reporting on the Project A. The Grantee shall implement and complete the Project in accordance with Exhibit A and with the plans and specifications contained in its Grant Application, which is on file with the State and is incorporated by reference. Modification of the Project shall require prior written approval of the State. B. The Grantee shall submit to the State written progress reports until the completion of the Project. These reports shall be submitted upon request by the State and shall contain such detail of progress or performance on the Project as is requested by the State.