Network Credentials Sample Clauses

Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
AutoNDA by SimpleDocs
Network Credentials. Client will provide documentation of Network Credentials Xxxxx’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the AmplifyIT Services implementation. Network Credentials include the following (if applicable):
Network Credentials. The City will provide Contractor with Network Credentials consisting of user IDs and passwords unique to each individual requiring Network access on behalf of the Contractor. Access rights will automatically expire one (1) year from the date of this Agreement. If this access is being granted for purposes of completing services for the City pursuant to a separate contract, then, this Agreement will expire at the completion of the contracted services, or upon termination of the contracted services, whichever occurs first. Services are being provided in accordance with City Secretary Contract No. _ . Services are being provided in accordance with City of Fort Worth Purchase Order No. _ . Services are being provided in accordance with the Agreement to which this Access Agreement is attached. No services are being provided pursuant to this Agreement.
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following: o Domain Administrator / Domain Server o Virtual Server—Vmware/VSphere o Azure/Azure AD o Firewall o Antivirus Managed Console Services required for the implementation beyond those described in this Threat Hunting Agreement, including any on- site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. Effective/version: Xxxxx 00, 0000 (Xx Xx Delivered) Marco’s Threat Hunting Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology environment through use of the Threat Hunting Tools described below. Marco will use the CrowdStrike Falcon Software and Perch Software and Equipment stated in the SOP (“Threat Hunting Tools”) to attempt to find evidence of the tactics, techniques, and procedures (TTP) commonly used by attackers to compromise information technology systems (“Threat Hunting” or “Services”). Following deployment of the Threat Hunting Tools as described below, Marco will notify Client of its findings and make recommendations about those findings. This Assessment is not designed or intended to replace a forensics investigation but may assist you in providing information to assist in such an investigation. The CrowdStrike Falcon Software and Perch Software and Sensor are referred to herein as “Threat Hunting Tools.” Threat Hunting Tools will be deployed remotely through automated methods. Perch sensor deployment may require onsite access for installation. Threat Hunting Tools remain in place for the period of the Subscription stated in the SOP. For Clients without an active Marco Managed IT Agreement, Marco will monitor the deployed Threat Hunting Tools for up to sixty (60) days and will notify Client of Marco findings during that period. See the Subscription terms for any additional services provided by CrowdStrike and/or Perch during the Subscription Term. If Client has an active Managed IT Agreement with Marco, Marco alerts will follow Marco’s standard Service Level Targets and Priority Standards. Marco’s monitoring and notification Services will be performed during Marco’s regular business hours. Subscription Terms Client understands and agrees that its Subscription is governed by...
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following (if applicable): o Domain Administrator / Domain Server o Public Domain Record Information o Local Server o Local Workstations / Thin Client Administration o Active Directory o Azure/Azure AD o O365 Credentials o SSL Certificates o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o Antivirus Managed Console o Public DNS Portals o Portal Addresses o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers Services required for the implementation beyond those described in this IdentifyIT Agreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. *This IdentifyIT Agreement is effective for services that begin on or after February 1, 2021. Any subsequent versions of this IdentifyIT Agreement will be made available at xxx.xxxxxxxx.xxx/xxxxx. (To Be Delivered) Marco’s IdentifyIT Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology through quarterly assessments (“IdentifyIT Assessment”). The IdentifyIT Assessment includes Marco’s review of a limited set of risks in four areas to the extent described below and the provision of recommendations concerning those risks. Marco will gather information for the IdentifyIT Assessment as described in paragraphs 1 through 4, below, by conducting interviews with Client personnel and by deploying certain Software on Client’s Designated Equipment (as applicable). Client requests that Marco provide this Assessment and consents to the deployment of Software and Marco’s access to Client’s information technology and personnel, including Client Information and Access, needed to provide this Assessment. Marco will: 1. Conduct an email phishing campaign designed to identify the security awareness maturity of Client’s active directory users;
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the
AutoNDA by SimpleDocs
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Implementation. Network credentials include the following: • XXX Network Jacks with Internet Access • Outgoing Port 443 Services required for the implementation beyond those described in this CSAgreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. version: July 13, 2021 (To Be Delivered) Marco’s PSaaS Agreement consists of the Equipment and Installation Services, Subscription for Access Right to the Cloud Platform Services and Support Services described below.
Network Credentials. Client will provide documention of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable):  Domain Administrator / Domain Server  Local Server  Local Workstation / Thin Client Administration  Virtual Server - VMware / VSphere  SAN Administrator  Firewall  Switch  Router – if client owned  Wireless Access Points  SQL Administrator  Email Administrator  AntiVirus Managed Console  Web Hosting or Web Filtering Appliance/Software  Email Filtering Appliance / Software  Universal Power Supply (UPS) / Battery Backup  Ilo/IMM – Management Login  Printers

Related to Network Credentials

  • Credentials The names and credentials of the individuals who: (1) designed the statistical sampling procedures and the review methodology utilized for the Claims Review and (2) performed the Claims Review.

  • Hosting Services 13.1 If Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract Hosts Customer Data in connection with an Acquisition, the provisions of Appendix 1, attached hereto and incorporated herein, apply to such Acquisition. 13.2 If the Hosting of Customer Data by Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract contributes to or directly causes a Data Breach, Supplier shall be responsible for the obligations set forth in Appendix 1 related to breach reporting requirements and associated costs. Likewise if such Hosting contributes to or directly causes a Security Incident, Supplier shall be responsible for the obligations set forth in Appendix 1, as applicable. 14 Change Management

  • Rosters 8.1 As far as practically possible, the Employer will draw up a roster 1 week in advance. Changes to rosters may occur with 24 hours notice or, subject to the availability of the Employee, with less notice if by mutual consent. 8.2 The Employer will ordinarily roster Employees in a manner that is both fair and equitable to ensure that, where applicable, the allocation of weekend and public holiday hours are equally divided between Employees on a rotating basis.

  • Provider Network The Panel of health service Providers with which the Contractor contracts for the provision of covered services to Members and Out-of-network Providers administering services to Members.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Training a. The employer, in consultation with the local, shall be responsible for developing and implementing an ongoing harassment and sexual harassment awareness program for all employees. Where a program currently exists and meets the criteria listed in this agreement, such a program shall be deemed to satisfy the provisions of this article. This awareness program shall initially be for all employees and shall be scheduled at least once annually for all new employees to attend. b. The awareness program shall include but not be limited to: i. the definitions of harassment and sexual harassment as outlined in this Agreement; ii. understanding situations that are not harassment or sexual harassment, including the exercise of an employer's managerial and/or supervisory rights and responsibilities; iii. developing an awareness of behaviour that is illegal and/or inappropriate; iv. outlining strategies to prevent harassment and sexual harassment; v. a review of the resolution of harassment and sexual harassment as outlined in this Agreement; vi. understanding malicious complaints and the consequences of such; vii. outlining any Board policy for dealing with harassment and sexual harassment; viii. outlining laws dealing with harassment and sexual harassment which apply to employees in B.C.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Support Services Rehabilitation, counselling and EAP’s. Support is strictly non- punitive, and can be accessed at anytime (self-identification of the need for help is strongly encouraged).

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!