Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.
Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.
Quality Control Program Engineer shall have a quality control program in place that ensures that all deliverable work is of high quality. Engineer shall submit a plan detailing its program to the Inspection Branch of the TxDOT Bridge Division for review and approval prior to beginning work. State may review or audit the programs.
Program Location A. Unless otherwise agreed upon in writing, the parties acknowledge and agree that the Work of this Agreement will be performed at the following Property address: Ktr Address1 Address2
Quality Control A. Controlled Affiliate agrees to use the Licensed Marks and Name only in connection with the licensed services and further agrees to be bound by the conditions regarding quality control shown in attached Exhibit A as they may be amended by BCBSA from time-to-time. B. Controlled Affiliate agrees to comply with all applicable federal, state and local laws. C. Controlled Affiliate agrees that it will provide on an annual basis (or more often if reasonably required by Plan or by BCBSA) a report or reports to Plan and BCBSA demonstrating Controlled Affiliate’s compliance with the requirements of this Agreement including but not limited to the quality control provisions of this paragraph and the attached Exhibit A. D. Controlled Affiliate agrees that Plan and/or BCBSA may, from time-to-time, upon reasonable notice, review and inspect the manner and method of Controlled Affiliate’s rendering of service and use of the Licensed Marks and Name. E. As used herein, a Controlled Affiliate is defined as an entity organized and operated in such a manner, that it meets the following requirements: (1) A Plan or Plans authorized to use the Licensed Marks in the Service Area of the Controlled Affiliate pursuant to separate License Agreement(s) with BCBSA, other than such Controlled Affiliate’s License Agreement(s), (the “Controlling Plan(s)”), must have the legal authority directly or indirectly through wholly-owned subsidiaries to select members of the Controlled Affiliate’s governing body having not less than 50% voting control thereof and to: (a) prevent any change in the articles of incorporation, bylaws or other establishing or governing documents of the Controlled Affiliate with which the Controlling Plan(s) do(es) not concur; (b) exercise control over the policy and operations of the Controlled Affiliate at least equal to that exercised by persons or entities (jointly or individually) other than the Controlling Plan(s); and Notwithstanding anything to the contrary in (a) through (b) hereof, the Controlled Affiliate’s establishing or governing documents must also require written approval by the Controlling Plan(s) before the Controlled Affiliate can: (i) change its legal and/or trade names; (ii) change the geographic area in which it operates; (iii) change any of the type(s) of businesses in which it engages; (iv) create, or become liable for by way of guarantee, any indebtedness, other than indebtedness arising in the ordinary course of business; (v) sell any assets, except for sales in the ordinary course of business or sales of equipment no longer useful or being replaced; (vi) make any loans or advances except in the ordinary course of business; (vii) enter into any arrangement or agreement with any party directly or indirectly affiliated with any of the owners or persons or entities with the authority to select or appoint members or board members of the Controlled Affiliate, other than the Plan or Plans (excluding owners of stock holdings of under 5% in a publicly traded Controlled Affiliate); (viii) conduct any business other than under the Licensed Marks and Name; (ix) take any action that any Controlling Plan or BCBSA reasonably believes will adversely affect the Licensed Marks and Name. In addition, a Plan or Plans directly or indirectly through wholly owned subsidiaries shall own at least 50% of any for-profit Controlled Affiliate. (2) A Plan or Plans authorized to use the Licensed Marks in the Service Area of the Controlled Affiliate pursuant to separate License Agreement(s) with BCBSA, other than such Controlled Affiliate’s License Agreement(s), (the “Controlling Plan(s)”), have the legal authority directly or indirectly through wholly-owned subsidiaries to select members of the Controlled Affiliate’s governing body having more than 50% voting control thereof and to: (a) prevent any change in the articles of incorporation, bylaws or other establishing or governing documents of the Controlled Affiliate with which the Controlling Plan(s) do(es) not concur; (b) exercise control over the policy and operations of the Controlled Affiliate. In addition, a Plan or Plans directly or indirectly through wholly-owned subsidiaries shall own more than 50% of any for-profit Controlled Affiliate.
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.
Project Location [Insert the location of the Project, if applicable]
Data Location 1.1. The CONTRACTOR shall not store or transfer non-public COUNTY data outside of the United States. This includes backup data and Disaster Recovery locations. The CONTRACTOR will permit its personnel and contractors to access COUNTY data remotely only as required to provide technical support. (Remote access to data from outside the continental United States is prohibited unless approved in advance and in writing by the County.) 1.2. The CONTRACTOR must notify the COUNTY in advance and in writing of any location changes to CONTRACTOR’s data center(s) that will process or store County data.