Protection of Access Credentials Sample Clauses

Protection of Access Credentials. Each Party will promptly notify the other Party of any actual or suspected misuse or security breach involving any Access Credentials.
AutoNDA by SimpleDocs
Protection of Access Credentials. To the extent that, as a part of the Services VITG provides Authorised Users with any access credentials to use or access any part of the Services (i.e. usernames or passwords), the Customer must, and must ensure its Authorised Users: keep those access credentials safe and secure. only use those access credentials for the purposes of accessing the relevant Services. not share those access credentials with any other person or allow any other person to use those access credentials to access the Services.

Related to Protection of Access Credentials

  • Hosting Services 13.1 If Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract Hosts Customer Data in connection with an Acquisition, the provisions of Appendix 1, attached hereto and incorporated herein, apply to such Acquisition.

  • SPECIAL SERVICES Should the Trust have occasion to request the Adviser to perform services not herein contemplated or to request the Adviser to arrange for the services of others, the Adviser will act for the Trust on behalf of the Fund upon request to the best of its ability, with compensation for the Adviser's services to be agreed upon with respect to each such occasion as it arises.

  • Janitorial Services Tenant will not employ any person for the purpose of cleaning the Premises or permit any person to enter the Building for such purpose other than Landlord's janitorial service, except with Landlord's prior written consent. Tenant will not necessitate, and will be liable for the cost of, any undue amount of janitorial labor by reason of Tenant's carelessness in or indifference to the preservation of good order and cleanliness in the Premises. Janitorial service will not be furnished to areas in the Premises on nights when such areas are occupied after 9:30 p.m., unless such service is extended by written agreement to a later hour in specifically designated areas of the Premises.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Maintenance Services Subject to Client’s timely payment of the applicable maintenance fees, Accenture will make available the following maintenance services (“Maintenance Services”):

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Continuity of Services A. The Contractor recognizes that the service(s) to be performed under this Contract are vital to the State and must be continued without interruption and that, upon Contract expiration, a successor, either the State or another contractor, may continue them. The Contractor agrees to:

  • Maintenance and Support Services As long as you are not using the Help Desk as a substitute for our training services on the Tyler Software, and you timely pay your maintenance and support fees, we will, consistent with our then-current Support Call Process:

Time is Money Join Law Insider Premium to draft better contracts faster.