Usernames and Passwords 1. Staff will not share usernames and passwords with anyone, including supervisors and technical support staff. 2. In the event that staff suspect their password is compromised or known to others, staff will change their password and notify their supervisor immediately.
Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.
Password To enable you, and only you, to use the Service, you will be asked to choose a password when you register and are accepted as a customer of the Service. This password is stored in encrypted form by us. You are responsible for maintaining the confidentiality of your Funds Transfer customer number and password. No one at OneUnited Bank has access to your Accounts passwords or user ID's. You are responsible for uses of the Service whether or not actually or expressly authorized by you. Therefore, it is important that you DO NOT SHARE YOUR ACCOUNT NUMBER OR PASSWORD WITH ANYONE FOR ANY REASON. No one at OneUnited Bank will know or need to know your password, and OneUnited Bank employees will never ask for your password. If you believe your password has been lost or stolen, or that someone has transferred or may transfer money from your Account without your permission, call: (877) ONE-UNITED or fax: (000) 000-0000, or e-mail: xxxxxxxxxxxxxxx@xxxxxxxxx.xxx, or write: Funds Transfer Administrator, OneUnited Bank 0000 Xxxxxxxx Xxxx, Los Angeles, CA, 90016. You agree to notify us AT ONCE if you believe your password has been lost or stolen. Telephoning us promptly is the best way to protect yourself from possible losses. If you never tell us, you could lose all of the money in your account (plus your maximum overdraft line of credit). However, if you tell us within 2 business days, you can lose no more than $50 if someone used your password without your permission. If you do NOT tell us within 2 business days after you learn of the loss or theft of your password, and we can prove we could have stopped someone from using your password without your permission if you had told us, you could lose as much as $500. You can see a complete statement of all your funds transfers effected or pending at any time by clicking on the History tab. If your statement shows transfers that you did not make, notify us AT ONCE. If you do not tell us within 60 days after the transfer was posted to your statement, you may not get back any money you lost after the 60 days, if we can prove that we could have stopped someone from taking the money if you had told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods.
Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.
Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.
Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.
Furnishing of Information and Inspection of Records The Borrower will furnish to the Deal Agent, each Lender, the Backup Servicer and the Collateral Agent, from time to time, such information with respect to the Loans and Contracts as may be reasonably requested, including, without limitation, a computer file or other list identifying each Loan and Contract by pool number, account number and dealer number and by the Outstanding Balance and identifying the Obligor on such Loan or Contract. The Borrower will, at any time and from time to time during regular business hours, upon reasonable notice, permit the Deal Agent, each Lender, the Backup Servicer and the Collateral Agent, or its agents or representatives, to examine and make copies of and abstracts from all Records, to visit the offices and properties of the Borrower for the purpose of examining such Records, and to discuss matters relating to the Loans or Contracts or the Borrower’s performance hereunder and under the other Transaction Documents with any of the officers, directors, employees or independent public accountants of the Borrower having knowledge of such matters; provided, however, that the Deal Agent, each Lender and the Collateral Agent each acknowledges that in exercising the rights and privileges conferred in this Section 5.1(m) it or its agents and representatives may, from time to time, obtain knowledge of information, practices, books, correspondence and records of a confidential nature and in which the Borrower has a proprietary interest. The Deal Agent, each Lender and the Collateral Agent each agrees that all such information, practices, books, correspondence and records are to be regarded as confidential information and agrees that it shall retain in strict confidence and shall use its reasonable efforts to ensure that its agents and representatives retain in strict confidence, and will not disclose without the prior written consent of the Borrower, any such information, practices, books, correspondence and records furnished to them except that it may disclose such information: (i) to its officers, directors, employees, agents, counsel, accountants, auditors, affiliates, advisors or representatives (provided that such Persons are informed of the confidential nature of such information); (ii) to the extent such information has become available to the public other than as a result of a disclosure by or through the Deal Agent, any Lender, the Collateral Agent or its officers, directors, employees, agents, counsel, accountants, auditors, affiliates, advisors or representatives; (iii) to the extent such information was available to the Deal Agent, any Lender or the Collateral Agent on a non-confidential basis prior to its disclosure hereunder; (iv) to the extent the Deal Agent, any Lender or the Collateral Agent should be (A) required under the Transaction Documents or in connection with any legal or regulatory proceeding or (B) requested by any bank regulatory authority to disclose such information; or (v) to any Lender or prospective assignee or Lender; provided, that the relevant Lender shall notify such prospective assignee or Lender of the confidentiality provisions of this Section 5.1(m).
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.
Subscriber Information Please print your individual or entity name and address. Joint subscribers should provide their respective names. Your name and address will be recorded exactly as printed below. 1. Subscriber’s Printed Name 2. Title, if applicable: 3. Subscriber’s Address: Street City, State, Zip Code 4. Telephone: 5. E-mail Address: