Internal Underlying Client Access Sample Clauses

Internal Underlying Client Access. 3.1 Internal Underlying Client Access is functionality within the PX Service that allows Customer to view, within the PX Service, Customer Outputs that are specific to the submitted Customer Data in respect of a particular Underlying Client.
AutoNDA by SimpleDocs

Related to Internal Underlying Client Access

  • Customer Feedback The contractor is expected to establish and maintain professional communication between its employees and customers. The primary objective of this communication is customer satisfaction. Customer satisfaction is the most significant external indicator of the success and effectiveness of all services provided and can be measured through customer complaints and surveys. Performance management drives the contractor to be customer focused through initially and internally addressing customer complaints and investigating the issues and/or problems but the customer always has the option to communicate complaints to the PM, as opposed to the contractor. Customer feedback may also be obtained either from the results of formal customer satisfaction surveys or from random customer complaints. Any customer complaints will be investigated by the PM using the Quality Assurance Monitoring Form – Customer Complaint Investigation, identified in Attachment A4.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation as Local Traffic under the Interconnection Attachment.

  • Information about Contractor Employees 23.1. The Authority may by notice require the Contractor to disclose such information as the Authority may require relating to those of the Contractor’s employees carrying out activities under or connected with the Framework Agreement.

  • Contract Migration Authorized Users holding individual Contracts with a Contractor at the time that Contractor is awarded a Centralized Contract for the same Products or services shall be permitted to migrate to that Centralized Contract effective with its commencement date. Such migration shall not operate to diminish, alter or eliminate any right that the Authorized User otherwise had under the terms and conditions of their individual Contract.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • CONTRACTOR STAFF WITHIN AUTHORIZED USER AGREEMENT The provisions of this section shall apply unless otherwise agreed in the Authorized User Agreement. All employees of the Contractor, or of its Subcontractors, who shall perform under an Authorized User Agreement, shall possess the necessary qualifications, training, licenses, and permits as may be required within the jurisdiction where the Services specified are to be provided or performed, and shall be legally entitled to work in such jurisdiction. All Business Entities that perform Services under the Contract on behalf of Contractor shall, in performing the Services, comply with all applicable Federal, State, and local laws concerning employment in the United States. Staffing Changes within Authorized User Agreement

  • Client Money Handling Rules 16.1. The Company will promptly place any Client money it receives into one or more segregated account(s) with reliable financial institutions (i.e. an affiliate, a bank, a market, a settlement agent, a clearing house or OTC counterparty) and the Client funds will be segregated from the Company’s own money and cannot be used in the course of its business. The Client money shall be treated, at all times, in accordance with the applicable ‘Client Money’ rules, as amended from time to time.

  • User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!