Common use of Remote Access Clause in Contracts

Remote Access. If Innovative requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of the Services, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer in writing, the below requirements must be met before Innovative is granted remote access to County Systems: A. Innovative will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance in writing by the County’s Director of Information Technology and Chief Information Officer. B. Innovative will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative will not access County Systems via unauthorized methods. C. Innovative’s remote access to County Systems will only be requested and activated on as-needed basis and disabled when not in use. D. Remote access is restricted only to County Systems necessary for Innovative to provide Services to County pursuant to this Agreement. E. Innovative will allow only its Workforce approved in advance by County to access County Systems. Innovative will promptly notify County whenever an individual member of Innovative's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative will keep a log of access when its Workforce remotely accesses County Systems. Innovative will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. If any member(s) of Innovative’s Workforce is provided with remote access to County Systems, then Innovative’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. Failure of Innovative to comply with this Section may result in Innovative and/or Innovative’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for Innovative, is under the direct control of Innovative, whether or not they are paid by Innovative and who have direct or incidental access to County Systems. I. For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 2 contracts

Samples: Renewal of Innovative Interface Agreement, Renewal of Innovative Interface Agreement

AutoNDA by SimpleDocs

Remote Access. If Innovative Solid Border requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of the Solid Border’s Services, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer in writing, the below requirements must be met before Innovative Solid Border is granted remote access to County Systems: A. Innovative (A) Solid Border will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance advanced in writing by the County’s Director of Information Technology and Chief Information Officer. B. Innovative (B) Solid Border will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative Solid Border will not access County Systems via unauthorized methods. C. Innovative(C) Solid Border’s remote access to County Systems will only be requested and activated on as-needed basis and disabled when not in use. D. (D) Remote access is restricted only to County Systems necessary for Innovative Solid Border to provide Services to County pursuant to this Agreement. E. Innovative (E) Solid Border will allow only its Workforce approved in advance by County to access County Systems. Innovative Solid Border will promptly notify County whenever an individual member of InnovativeSolid Border's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative Solid Border will keep a log of access when its Workforce remotely accesses County Systems. Innovative Solid Border will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. (F) If any member(s) of InnovativeSolid Border’s Workforce is provided with remote access to County Systems, then InnovativeSolid Border’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. (G) Failure of Innovative Solid Border to comply with this Section may result in Innovative Solid Border and/or InnovativeSolid Border’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for InnovativeSolid Border, is under the direct control of InnovativeSolid Border, whether or not they are paid by Innovative Solid Border and who have direct or incidental access to County Systems. I. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 2 contracts

Samples: Addendum to Solid Border, Inc.’s Agreement, Addendum to Solid Border, Inc.’s Agreement

Remote Access. If Innovative Axon requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of the Servicesmaintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer Director in writing, the below requirements must be met before Innovative Axon is granted remote access to County Systems: A. Innovative (A) Axon will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance advanced in writing by the County’s Director of Information Technology and Chief Security Manager or the Assistant Information OfficerTechnology Manager. B. Innovative (B) Axon will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative Axon will not access County Systems via unauthorized methods. C. Innovative(C) Axon’s remote access to County Systems will only be requested and activated on as-as- needed basis and disabled when not in use. D. (D) Remote access is restricted only to County Systems necessary for Innovative Axon to provide Services to County pursuant to this Agreement. E. Innovative (E) Axon will allow only its Workforce approved in advance by County to access County Systems. Innovative Axon will promptly notify County whenever an individual member of InnovativeAxon's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative Axon will keep a log of access when its Workforce remotely accesses County Systems. Innovative Axon will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. (F) If any member(s) of InnovativeAxon’s Workforce is provided with remote access to County Systems, then InnovativeAxon’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. (G) Failure of Innovative Axon to comply with this Section may result in Innovative Axon and/or InnovativeAxon’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for InnovativeAxon, is under the direct control of InnovativeAxon, whether or not they are paid by Innovative Axon and who have direct or incidental access to County Systems. I. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 2 contracts

Samples: Addendum to Agreement for Public Safety Video Surveillance Solutions, Addendum to Agreement for Public Safety Video Surveillance Solutions

Remote Access. If Innovative Axon requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of the Servicesmaintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer in writing, the below requirements must be met before Innovative Axon is granted remote access to County Systems: A. Innovative (A) Axon will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance advanced in writing by the County’s Director of Information Technology and Chief Information Officer. B. Innovative (B) Axon will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative Axon will not access County Systems via unauthorized methods. C. Innovative(C) Axon’s remote access to County Systems will only be requested and activated on as-as- needed basis and disabled when not in use. D. (D) Remote access is restricted only to County Systems necessary for Innovative Axon to provide Services to County pursuant to this Agreement. E. Innovative (E) Axon will allow only its Workforce approved in advance by County to access County Systems. Innovative Axon will promptly notify County whenever an individual member of InnovativeAxon's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative Axon will keep a log of access when its Workforce remotely accesses County Systems. Innovative Axon will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. (F) If any member(s) of InnovativeAxon’s Workforce is provided with remote access to County Systems, then InnovativeAxon’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. (G) Failure of Innovative Axon to comply with this Section may result in Innovative Axon and/or InnovativeAxon’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for InnovativeAxon, is under the direct control of InnovativeAxon, whether or not they are paid by Innovative Axon and who have direct or incidental access to County Systems. I. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Samples: Addendum to Agreement

Remote Access. If Innovative Noble requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of the Servicesmaintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer Director in writing, the below requirements must be met before Innovative Noble is granted remote access to County Systems: A. Innovative (A) Xxxxx will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance advanced in writing by the County’s Director of Information Technology and Chief Security Manager or the Assistant Information OfficerTechnology Manager. B. Innovative (B) Noble will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative Noble will not access County Systems via unauthorized methods. C. Innovative(C) Noble’s remote access to County Systems will only be requested and activated on as-as- needed basis and disabled when not in use. D. (D) Remote access is restricted only to County Systems necessary for Innovative Noble to provide Services to County pursuant to this Agreement. E. Innovative (E) Noble will allow only its Workforce approved in advance by County to access County Systems. Innovative Xxxxx will promptly notify County whenever an individual member of Innovative's Xxxxx'x Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative Noble will keep a log of access when its Workforce remotely accesses County Systems. Innovative Noble will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. (F) If any member(s) of InnovativeNoble’s Workforce is provided with remote access to County Systems, then Innovative’s Xxxxx’x workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. (G) Failure of Innovative Noble to comply with this Section may result in Innovative Noble and/or InnovativeNoble’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for InnovativeNoble, is under the direct control of InnovativeNoble, whether or not they are paid by Innovative Xxxxx and who have direct or incidental access to County Systems. I. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Samples: Software Hosting Agreement

Remote Access. If Innovative Noble requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of the Servicesmaintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer Director in writing, the below requirements must be met before Innovative Noble is granted remote access to County Systems: A. Innovative (A) Xxxxx will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance advanced in writing by the County’s Director of Information Technology and Chief Security Manager or the Assistant Information OfficerTechnology Manager. B. Innovative (B) Noble will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative Noble will not access County Systems via unauthorized methods. C. Innovative(C) Noble’s remote access to County Systems will only be requested and activated on as-as- needed basis and disabled when not in use. D. (D) Remote access is restricted only to County Systems necessary for Innovative Noble to provide Services to County pursuant to this Agreement. E. Innovative (E) Noble will allow only its Workforce approved in advance by County to access County Systems. Innovative Xxxxx will promptly notify County whenever an individual member of Innovative's Xxxxx'x Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative Noble will keep a log of access when its Workforce remotely accesses County Systems. Innovative Noble will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. (F) If any member(s) of InnovativeNoble’s Workforce is provided with remote access to County Systems, then Innovative’s Xxxxx’x workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. (G) Failure of Innovative Noble to comply with this Section may result in Innovative Noble and/or InnovativeNoble’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for InnovativeNoble, is under the direct control of InnovativeNoble, whether or not they are paid by Innovative Xxxxx and who have direct or incidental access to County Systems. I. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s). THIS SOFTWARE LICENSE AGREEMENT (this "Agreement") is made and entered into and effective 10/1/2021 (the "Effective Date") by and between Noble Software Group, LLC, (hereinafter called "Noble"), and Fort Bend County a body corporate and politic under the laws of the State of Texas, located at 000 Xxxxxxx Xx., Richmond, TX, 77469 (hereinafter called "Client").

Appears in 1 contract

Samples: Software Hosting Agreement

Remote Access. If Innovative Axon requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of the Servicesmaintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer in writing, the below requirements must be met before Innovative Axon is granted remote access to County Systems: A. Innovative (A) Axon will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance advanced in writing by the County’s Director of Information Technology and Chief Information Officer. B. Innovative (B) Axon will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative Axon will not access County Systems via unauthorized methods. C. Innovative(C) Axon’s remote access to County Systems will only be requested and activated on as-as- needed basis and disabled when not in use. D. (D) Remote access is restricted only to County Systems necessary for Innovative Axon to provide Services to County pursuant to this Agreement. E. Innovative (E) Axon will allow only its Workforce approved in advance by County to access County Systems. Innovative Axon will promptly notify County whenever an individual member of InnovativeAxon's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative Axon will keep a log of access when its Workforce remotely accesses County Systems. Innovative Axon will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. (F) If any member(s) of InnovativeAxon’s Workforce is provided with remote access to County Systems, then InnovativeAxon’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. (G) Failure of Innovative Axon to comply with this Section may result in Innovative Axon and/or InnovativeAxon’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for InnovativeAxon, is under the direct control of InnovativeAxon, whether or not they are paid by Innovative Xxxx and who have direct or incidental access to County Systems. I. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Samples: Addendum to Agreement

AutoNDA by SimpleDocs

Remote Access. If Innovative As applicable, if Axon requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of the Servicesmaintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer in writing, the below requirements must be met before Innovative Axon is granted remote access to County Systems: A. Innovative (A) Axon will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance advanced in writing by the County’s Director of Information Technology and Chief Information Officer. B. Innovative (B) Axon will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative Axon will not access County Systems via unauthorized methods. C. Innovative(C) Axon’s remote access to County Systems will only be requested and activated on as-as- needed basis and disabled when not in use. D. (D) Remote access is restricted only to County Systems necessary for Innovative Axon to provide Services to County pursuant to this Agreement. E. Innovative (E) Axon will allow only its Workforce approved in advance by County to access County Systems. Innovative Axon will promptly notify County whenever an individual member of InnovativeAxon's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative Axon will keep a log of access when its Workforce remotely accesses County Systems. Innovative Axon will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. (F) If any member(s) of InnovativeAxon’s Workforce is provided with remote access to County Systems, then InnovativeAxon’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. (G) Failure of Innovative Axon to comply with this Section may result in Innovative Axon and/or InnovativeAxon’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for InnovativeAxon, is under the direct control of InnovativeAxon, whether or not they are paid by Innovative Xxxx and who have direct or incidental access to County Systems. I. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Samples: Addendum to Agreement for Interview Room Cameras and Related Equipment, Installation, and Software Services

Remote Access. If Innovative As applicable, if CobbFendley requires remote access to County Systems for support, installation, integrations, configurations, maintenance, and/or maintenance provision of the Servicesservices, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer in writing, the below requirements must be met before Innovative CobbFendley is granted remote access to County Systems: A. Innovative a. CobbFendley will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance advanced in writing by the County’s Director of Information Technology and Chief Information Officer. B. Innovative b. CobbFendley will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative CobbFendley will not access County Systems via unauthorized methods. C. Innovativec. CobbFendley’s remote access to County Systems will only be requested and activated on as-needed basis and disabled when not in use. D. d. Remote access is restricted only to County Systems necessary for Innovative CobbFendley to provide Services product and/or services to County pursuant to this Agreement. E. Innovative e. CobbFendley will allow only its Workforce approved in advance by County to access County Systems. Innovative CobbFendley will promptly notify County whenever an individual member of InnovativeCobbFendley's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative CobbFendley will keep a log of access when its Workforce remotely accesses County Systems. Innovative CobbFendley will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. f. If any member(s) of InnovativeCobbFendley’s Workforce is provided with remote access to County Systems, then InnovativeCobbFendley’s workforce Workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. g. Failure of Innovative CobbFendley to comply with this Section may result in Innovative CobbFendley and/or InnovativeCobbFendley’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. h. For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for InnovativeXxxxXxxxxxx, is under the direct control of InnovativeCobbFendley, whether or not they are paid by Innovative XxxxXxxxxxx and who have direct or incidental access to County Systems. I. i. For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Samples: Amendment to Cobb, Fendley & Associates, Inc.’s Agreement

Remote Access. If Innovative Solid Border requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of the Servicesmaintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer Director in writing, the below requirements must be met before Innovative Solid Border is granted remote access to County Systems: A. Innovative (A) Solid Border will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance advanced in writing by the County’s Director of Information Technology and Chief Security Manager or the Assistant Information OfficerTechnology Manager. B. Innovative (B) Solid Border will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Innovative Solid Border will not access County Systems via unauthorized methods. C. Innovative(C) Solid Border’s remote access to County Systems will only be requested and activated on as-needed basis and disabled when not in use. D. (D) Remote access is restricted only to County Systems necessary for Innovative Solid Border to provide Services to County pursuant to this Agreement. E. Innovative (E) Solid Border will allow only its Workforce approved in advance by County to access County Systems. Innovative Solid Border will promptly notify County whenever an individual member of InnovativeSolid Border's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Innovative Solid Border will keep a log of access when its Workforce remotely accesses County Systems. Innovative Solid Border will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. F. (F) If any member(s) of InnovativeSolid Border’s Workforce is provided with remote access to County Systems, then InnovativeSolid Border’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. G. (G) Failure of Innovative Solid Border to comply with this Section may result in Innovative Solid Border and/or InnovativeSolid Border’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. H. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for InnovativeSolid Border, is under the direct control of InnovativeSolid Border, whether or not they are paid by Innovative Solid Border and who have direct or incidental access to County Systems. I. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Samples: Addendum to Solid Border, Inc.’s Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!