General OSS Policies Sample Clauses

General OSS Policies. 37.3.1 Due to enhancements and on-going development of access to SBC- ASI/13State’s OSS functions, certain interfaces described in this Agreement may be modified, temporarily unavailable or may be phased out after execution of this Agreement.
AutoNDA by SimpleDocs
General OSS Policies. Due to enhancements and on-going development of access to SBC-ASI/8-STATE’s OSS functions, certain interfaces described in this Agreement may be modified, temporarily unavailable or may be phased out after execution of this Agreement. Each Party’s resources are for approved business purposes only. Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its own systems, and take appropriate action should unauthorized or improper usage be discovered. Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. Authorized users must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other. User Identification. Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions. User identification shall be accomplished by the assignment of a unique, permanent user ID, and each user ID shall have an associated identification number for security purposes. User Authentication. Users will usually be authenticated by use of a password. Strong authentication methods (e.g. one-time passwords, digital signatures, etc.) may be required in the future. Passwords must not be stored in script files. Passwords must be entered by the user in real time. Personal passwords must not be shared. A user who has shared his password is responsible for any use made of the password.
General OSS Policies. (1) Due to enhancements and on-going development of access to ASI-North’s OSS functions, certain interfaces described in this Agreement may be modified, temporarily unavailable or may be phased out after execution of this Agreement.

Related to General OSS Policies

  • Your General Obligations 6.1 Full information You must give us any information we reasonably require for the purposes of this contract. The information must be correct, and you must not mislead or deceive us in relation to any information provided to us.

  • General Obligations 1. Each Party shall apply its measures relating to the provisions of this Chapter in accordance with Article 116 (General Principles) and, in particular, shall expeditiously apply those measures so as to avoid unduly impairing or delaying trade in goods or services or conduct of investment activities under this Agreement. 2. Nothing in this Chapter shall be construed to prevent a Party from applying measures to regulate the entry of natural persons into, or their temporary stay in, its territory, including those measures necessary to protect the integrity of, and to ensure the orderly movement of natural persons across, its borders, provided that such measures are not applied in such a manner as to unduly impair or delay trade in goods or services or conduct of investment activities under this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!