Logical Access. The Client is to ensure that the Supplier Personnel and any Third Party Personnel nominated by the Supplier are given administrative access to the software and systems the Supplier supports in order that the Services may be delivered and maintained in accordance with the terms of this Agreement.
Logical Access. Provider represents and warrants that it has established and during the Term it will at all times enforce:
(a) Appropriate mechanisms for user authentication and authorization in accordance with a “need to know” policy;
(b) Controls to enforce rigorous access restrictions for remote users, contractors and service providers;
(c) Timely and accurate administration of user account and authentication management;
(d) Processes to ensure assignment of unique IDs to each person with computer access;
(e) Processes to ensure Provider-supplied defaults for passwords and security parameters are changed and appropriately managed ongoing;
(f) Mechanisms to track all access to Confidential Information by unique ID;
(g) Mechanisms to encrypt or hash all passwords; and
(h) Processes to immediately revoke accesses of inactive accounts or terminated/transferred users.
Logical Access. Welocalize will provide the Supplier's employees and sub-contractors with necessary access to the software and systems in order that the Services may be delivered and maintained in accordance with the terms of this Agreement.
Logical Access. Xxxxxx limits systems and Customer Materials access exclusively to the users with a legitimate need. Xxxxxx deactivates redundant accounts and expired access grants in a timely manner. Xxxxxx performs regular reviews of access to validate need to know.
Logical Access. (Layer 2))
Logical Access. (Layer 2)) point synchronous line with Frame Relay or ATM encapsulation applied instead of HDLC/PPP. No ATM switch is present and no CIR/SCR policy is applied. The Dedicated IP connection type with Frame Relay or ATM encapsulation is suitable for converged access to multiple customer MPLS VPNs only, for example what is often referred to as a multi-VRF implementation. With regards to IP QoS, CenturyLink’s default configuration is to apply layer 3 policies on a per PVC basis where the bandwidth of each PVC is rate limited and an IP QoS template performs class-based queuing and scheduling relative to the assigned bandwidth. The sum of the bandwidth from each PVC cannot exceed the subscriber port size. CenturyLink has a product policy which limits the maximum number of PVCs per subscriber port to 10.
Logical Access. In the event Implementer or its Implementer Parties require certain access as re- quested by PG&E to PG&E systems (Logical Access), in either instance, Implementer when provid- ing Services to PG&E under its Program, shall submit to PG&E each person’s full name and last four digits of their social security number to the following address: XxxxxxxxxxXxxxxxxxx@xxx.xxx. PG&E reserves the right to decline any such individual and Implementer shall promptly provide a replacement. PG&E may at any time require other safeguarding procedures.
Logical Access. The Customer is to ensure that Standard Digital Personnel and any Third-Party Personnel nominated by Standard Digital are given administrative access to the software and systems Standard Digital supports in order that the Professional Services may be delivered and maintained in accordance with the terms of this Agreement.
Logical Access. (i) appropriate mechanisms for user authentication and authorization in accordance with a “least privilege” policy;
(ii) controls and auditable logs to enforce and maintain rigorous access restrictions for employees, and subcontractors, including encryption of data transmission and encrypted data during remote access sessions;
(iii) timely and accurate administration of user account and authentication management;
(iv) processes to ensure assignment of unique IDs to each person with computer access;
(v) processes to ensure defaults for passwords and security parameters are appropriately managed (e.g., changed periodically etc.);
(vi) mechanisms to track and log all access to Client Data by unique ID;
(vii) mechanisms to encrypt or hash all passwords or otherwise ensure all passwords are not stored unsecured in clear text; and
(viii) processes to immediately revoke accesses of inactive accounts or terminated/transferred users.
Logical Access. (i) controls to enforce and maintain access restrictions for employees, and subcontractors, including encryption of data transmission and encrypted data during remote access sessions;
(ii) processes to ensure assignment of unique IDs to each person with computer access;
(iii) processes to ensure vendor-supplied defaults for passwords and security parameters are appropriately managed (e.g., changed periodically etc.);
(iv) mechanisms to track and log all access to Customer Personal Data by unique ID;
(v) mechanisms to encrypt or hash all passwords or otherwise ensure all passwords are not stored unsecured in clear text; and
(vi) processes to promptly revoke accesses of inactive accounts or terminated/transferred users.