Logical Access. The Client is to ensure that the Supplier Personnel and any Third Party Personnel nominated by the Supplier are given administrative access to the software and systems the Supplier supports in order that the Services may be delivered and maintained in accordance with the terms of this Agreement.
Logical Access. Provider represents and warrants that it has established and during the Term it will at all times enforce:
Logical Access. Welocalize will provide the Supplier's employees and sub-contractors with necessary access to the software and systems in order that the Services may be delivered and maintained in accordance with the terms of this Agreement.
Logical Access. (Layer 2)) Yes A point-to-point synchronous line provisioning method for Frame Relay or ATM encapsulation is available when using the IQ Networking Dedicated IP connection type. The CenturyLink Lucent based. Frame Relay or ATM network Lucent switches will not be used for transport, which is referred to as Dedicated FR or Dedicated ATM connection type, respectively. The customer access line will be a point-to-
Logical Access. (Layer 2)) point synchronous line with Frame Relay or ATM encapsulation applied instead of HDLC/PPP. No ATM switch is present and no CIR/SCR policy is applied. The Dedicated IP connection type with Frame Relay or ATM encapsulation is suitable for converged access to multiple customer MPLS VPNs only, for example what is often referred to as a multi-VRF implementation. With regards to IP QoS, CenturyLink’s default configuration is to apply layer 3 policies on a per PVC basis where the bandwidth of each PVC is rate limited and an IP QoS template performs class-based queuing and scheduling relative to the assigned bandwidth. The sum of the bandwidth from each PVC cannot exceed the subscriber port size. CenturyLink has a product policy which limits the maximum number of PVCs per subscriber port to 10.
Logical Access. (i) appropriate mechanisms for user authentication and authorization in accordance with a “least privilege” policy;
Logical Access. (i) controls to enforce and maintain access restrictions for employees, and subcontractors, including encryption of data transmission and encrypted data during remote access sessions;
Logical Access. In the event Implementer or its Implementer Parties require certain access as re- quested by PG&E to PG&E systems (Logical Access), in either instance, Implementer when provid- ing Services to PG&E under its Program, shall submit to PG&E each person’s full name and last four digits of their social security number to the following address: XxxxxxxxxxXxxxxxxxx@xxx.xxx. PG&E reserves the right to decline any such individual and Implementer shall promptly provide a replacement. PG&E may at any time require other safeguarding procedures.
Logical Access. The Customer is to ensure that Standard Digital Personnel and any Third-Party Personnel nominated by Standard Digital are given administrative access to the software and systems Standard Digital supports in order that the Professional Services may be delivered and maintained in accordance with the terms of this Agreement.
Logical Access. Licensee shall protect logical access to the source code with logical access protection procedures and protections. Licensee shall control access to the Licensor Machine and the source code and documentation via password protection schemes and/or restricted access terminal rooms. Each system log-on password must be randomly selected, not obvious or trivial, and at least six numeric, five alpha, or four alphanumeric characters in length, and must be changed at least once every month. Once terminal access has been established, the terminal must not be left unattended until the terminal access is terminated. Licensee shall not connect the Licensor Machine to any private or public network, including the Internet or the N2P Managed Network, except that Licensee may connect the Licensor Machine to Licensee's Ethernet network to build the proper object code, provided that the Licensor Machine is configured so that it may only receive files from such network and that it may not be accessed from users on such network. The provisions of this Exhibit P shall be in addition to the provisions of Section 4.3 and the other provisions of this Agreement. EXHIBIT Q PROGRAMMER CONFIDENTIALITY AGREEMENT This Confidentiality Agreement (the "Agreement") is made and entered into between [MICROSOFT CORPORATION/NET2PHONE INC.] (the "Company") and [OTHER COMPANY'S EMPLOYEE] (the "Programmer") as of the ____ day of _______, 2000.