Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.
Project Management Plan 1 3.4.1 Developer is responsible for all quality assurance and quality control 2 activities necessary to manage the Work, including the Utility Adjustment Work.
Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.
Electric Service 1. The Authority shall make available Electric Service to enable the Customer to receive the Allocation in accordance with this Agreement, Service Tariff No. WNY-2 and the Rules.
Electric Systems Are there any problems with electrical fuses, circuit breakers, outlets or wiring? Yes No. Unknown Comments:
Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.
Pacific Gas and Electric Company “PG&E”), San Diego Gas & Electric Company (“SDG&E”), and Southern California Edison Company (“Edison”) (each a Participating TO) are entering into this agreement transferring Operational Control of their transmission facilities in reliance upon California Public Utilities Code Sections 367, 368, 375, 376, and 379 enacted as part of AB 1890 which contain assurances and schedules with respect to recovery of transition costs.
Administrative Controls The Contractor must have the following controls in place:
Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to PCS for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers.