Operations Manager Secondary Contact Email Secondary Contact Phone Secondary Contact Fax Secondary Contact Mobile 1 Administration Fee Contact Name Administration Fee Contact Email 1 Administration Fee Contact Phone 2 0
Co-operation Each Party acknowledges that this ESA must be approved by the Department and agree that they shall use Commercially Reasonable efforts to cooperate in seeking to secure such approval.
Operations Fire An “Operations Fire” is a fire caused by Purchaser’s Operations other than a Neg- ligent Fire.
General Manager Secondary Contact Email Secondary Contact Phone Secondary Contact Fax Secondary Contact Mobile 1 Administration Fee Contact Name Administration Fee Contact Email 1 9 Administration Fee Contact Phone 2 0
Processing operations The personal data transferred will be subject to the following basic processing activities (please specify):
Communications and Operations Management a. Network Penetration Testing - DST shall, on approximately an annual basis, contract with an independent third party to conduct a network penetration test on its network having access to or holding or containing Fund Data. DST shall have a process to review and evaluate high risk findings resulting from this testing.
Manager 5.1. Rules relating to the rights, duties and responsibilities of the Managers shall be governed by the Act. Such provisions are hereinafter incorporated into this Agreement by reference. Without limiting the generality of the foregoing, the Manager shall have the powers set forth in Paragraph 5.3 below.
Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:
Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.
Service Management Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components.