Physical Access to Network Sample Clauses

Physical Access to Network. Soundtrap regularly monitors physical access to its network and assets to detect potential threats.
AutoNDA by SimpleDocs
Physical Access to Network. Soundtrap regularly monitors physical access to its network and assets to detect potential threats. This Plan is periodically reviewed and updated to ensure that we comply with changes to applicable international, federal, state, and local data security and privacy. All employees of Soundtrap and third parties engaged by, or on behalf of Soundtrap are responsible for information security as part of their job responsibilities, hence all are expected to comply with Soundtrap overarching policies, guidelines and instructions. rcsd_student_data_privacy_07-2019 Final Audit Report 2020-12-17 "rcsd_student_data_privacy_07-2019" History Document created by Xxxx Xxxxxxxx (xxxxx@xxxxxxx.xxx) 2020-12-17 - 5:52:57 PM GMT- IP address: 73.158.137.126 Document emailed to Xxxxxxx Xxxx (xxxxx@xxxxxxx.xxx) for signature 2020-12-17 - 5:54:35 PM GMT Email viewed by Xxxxxxx Xxxx (xxxxx@xxxxxxx.xxx) 2020-12-17 - 9:54:36 PM GMT- IP address: 66.102.7.179 Document e-signed by Xxxxxxx Xxxx (xxxxx@xxxxxxx.xxx) Signature Date: 2020-12-17 - 9:54:51 PM GMT - Time Source: server- IP address: 108.233.250.251 Document emailed to Xxxxx Xxxxx (xxxxxx@xxxxx0.xxx) for signature 2020-12-17 - 9:54:53 PM GMT Email viewed by Xxxxx Xxxxx (xxxxxx@xxxxx0.xxx) 2020-12-17 - 11:31:26 PM GMT- IP address: 66.102.7.177 Document e-signed by Xxxxx Xxxxx (xxxxxx@xxxxx0.xxx) Signature Date: 2020-12-17 - 11:32:47 PM GMT - Time Source: server- IP address: 162.205.221.83 Agreement completed. 2020-12-17 - 11:32:47 PM GMT Created: 2020-12-17 By: Status: Transaction ID: Xxxx Xxxxxxxx (xxxxx@xxxxxxx.xxx) Signed

Related to Physical Access to Network

  • Physical Access PROVIDER agrees to allow the Office of Early Learning and COALITION staff or sub-contractors immediate access to the facilities and spaces used to offer the VPK Program during normal business hours.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Worksite 9.4.1 Authorized representatives of the Association shall have the right to transact official Association business on school property during regular school business hours provided that such activities or use do not interfere with classroom instruction or interrupt normal operations.

  • Access to Service You acknowledge that Your ability to access the Service may require the payment of third- party fees (such as telephone toll charges, ISP, or airtime charges) and that You are responsible for paying such fees. The Provider is not responsible for any equipment You may need to be able to access the Service.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!