Operational Controls. Whilst Operational Controls may include either administrative or technical entitlement controls the most effective Operational Controls are likely to include technical entitlement systems supported by documented administrative procedures. A possible component of an Operational Controls framework is the deployment of a permissioning system to assist in the correct distribution and reporting of Data. In the absence of effective Operational Controls, applied at the Device or Unique User Id level, Turquoise reserves the right to apply Charges where applicable, on the basis of reasonable estimates of Devices or Unique User Ids with access to the Data. For example if Data is fed into a network which does not control access, then all Devices or Unique User Ids, with access to that network must be reported as Fee liable for all levels of Data available within the network.
Operational Controls. Contractor shall implement operational procedures and controls designed to ensure that technology and information systems are configured and maintained according to prescribed internal standards and consistent with applicable Industry Standard Safeguards. Examples of Industry Standard Safeguards are ISO/IEC 27002:2005, NIST 800-44, Microsoft Security Hardening Guidelines, OWASP Guide to Building Secure Web Applications, SOC 2 Type 2, and the various Center for Internet Security Standards. Moreover, Contractor shall use application security and software development controls designed to eliminate and minimize the introduction of security vulnerabilities.
Operational Controls. Except for the uses of Information specified in Sections 2.10, 2.12 and 2.13 below, or where an exception for any other use is specified and approved by BHB in accordance with this Agreement, Licensee shall maintain Operational Controls sufficient to identify, record and control all use of and access to Information and to detect unlicensed use. In particular, where Licensee distributes Real-time Information on or via publicly accessible internet Websites, downloadable terminal applications, wireless data dissemination, mobile telephone or electronic messaging services, Licensee must ensure that all access is restricted to registered Users with individual passwords and Unique User ID’s and valid Subscriber Agreements.
Operational Controls. Insurance Company agrees to provide information on its compliance policies and operational controls that relate to the services it provides under this Agreement. Insurance Company further agrees to permit Transfer Agent or its representatives to have reasonable access to personnel and records to facilitate the monitoring of its compliance procedures and operational controls.
Operational Controls. In its performance of Hosted Subscription Services, Verint shall maintain operational controls sufficient to enable Verint’s satisfaction of its performance obligations in this Section 3, including, without limitation, the following: • Verint will utilize up-to-date and comprehensive virus and malware protection capabilities, and commercially reasonable practices, including detection, scanning and removal of known viruses, worms and other malware on the Verint’s hosting systems. These virus protection capabilities will be in force on all computers and/or devices utilized in connection with the technology services, as well as on all data files or other transfers that have access or are connected to Verint’s hosting system. • If a virus, worm or other malware causes a loss of operational efficiency or loss of data, Verint will mitigate losses and restore data from the last virus free backup to the extent practicable. • Verint shall obligate its hosting partners to provide a multiple layered security approach. This shall include perimeter firewalls, DMZ, one or more internal network segments, and network intrusion detection monitors for attempted intrusion to the production environment. Network vulnerability scans shall be conducted regularly and issues addressed according to Industry Standard change control processes. • Verint shall mitigate security vulnerabilities through the use of perimeter and host countermeasures such as intrusion prevention, web application firewall, IP address shunning, and other measures designed to prevent successful exploitation of vulnerabilities. • Verint and its hosting partners shall proactively address security risks by applying released security patches, including, as example, Windows security patching and updates to patch known vulnerabilities in an applicable operating system. Patches shall be deployed to production via Verint’s change management process. Verint shall test all patches in its test environment prior to release to production. If a patch degrades or disables the production environment, Verint shall continue to mitigate vulnerabilities until a patch is provided by the software or operating system manufacturer that does not degrade or disable production. Such mitigation efforts may include intrusion prevention, web application firewall, and other measures chosen by Verint to reduce likelihood or prevent successful access to Customer Data by an unauthorized party. • Each month, Verint and its hosting partners sha...
Operational Controls. In its performance of Hosted Subscription Services, Verint shall maintain operational controls sufficient to enable Verint’s satisfaction of its performance obligations in this Section 3, including, without limitation, the following:
Operational Controls. Issuer maintains a system of internal accounting controls sufficient to provide reasonable assurance that (1) transactions are executed in accordance with the Issuer management’s general or specific authorizations and (2) transactions are recorded as necessary to permit preparation of financial statements in conformity with generally accepted accounting principles and to maintain asset accountability. Issuer is not aware of any substantial problems of an operational nature that the Issuer may be experiencing and that may endanger the
Operational Controls. Licensee’s Operational Controls must have the capabilities as below to electronically verify, control, monitor and report the usage, enablement and disablement of the distribution of Information to each, and every, recipient. Operational Controls must capture the following data:
i) Details of each, and every, Licensee’s recipients;
ii) Date/period each recipient is capable of accessing the Information including for e.g. passwords;
iii) Each, and every, type of Information distributed or accessed. This includes, but is not limited to, for the purposes of an End User, Non Display Usage, and Original Created Works. Bursa may require Licensee to provide documentation, details and diagrams, of its Entitlements or Permissioning Systems, their functionality and specifications.
Operational Controls. Verint shall maintain operational controls sufficient to enable Verint’s satisfaction of its performance obligations in this Section 2, including, without limitation, the following:
Operational Controls. (1) Theia Partners / Envari will have full operational control of the WET System and the wet well and ETS and they will remain secured and accessible with remote video surveillance at all times, provided that:
(a) During the Term Theia Partners / Envari will provide the City with visual access to all agreed upon operational outputs of the WET System and to Theia Partners / Envari’s non-financial records relating to the Project in order that that the City can develop its policies and procedures relating to wastewater energy transfer projects;
(b) authorized City employees will have access to the wet well for annual inspections and to the ETS but only in the event of an emergency; and
(c) Theia Partners/Envari shall shut off the WET system connection to City infrastructure at the request of the City and ensure the WET system is isolated in accordance with Section 9(1) (a)(vi).