Remote System Access Sample Clauses

Remote System Access. 6.1. The Supplier offers a range of user authentication options to help to identify users before they interact with the Customer’s business system. The Supplier’s preferred method is secure VPN tunnelling using IPSec (authentication and encryption). This would require a VPN server, which can be supplied by the Supplier or an existing VPN solution can be utilised if appropriate. 6.2. The Supplier’s employees, agents and/or subcontractors will ensure that they adhere to any reasonable security processes and procedures notified by the Customer to the Supplier in writing.
AutoNDA by SimpleDocs
Remote System Access. Customer agrees to provide TWNS approved remote access to the communications equipment so that the Service Level Agreements contained herein can be met, and to perform service on the covered equipment and software; including scheduled maintenance tasks, minor Adds, Moves and Changes, and for TWNS to assist Customer when they are programming. Any TWNS time required to set up a web collaboration for remote access may be billable to Customer by TWNS.

Related to Remote System Access

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!