Remote Virtualization Sample Clauses

Remote Virtualization. Any user of a Licensed Device, or any device used by a Licensed User, may remotely access up to four Virtual OSEs or one Physical OSE of Windows software acquired through a volume licensing agreement on (a) device(s) dedicated to Customer’s use. Dedicated Servers that are under the management or control of an entity other than Customer or one of its Affiliates are subject to the Outsourcing Software Management clause. Notwithstanding anything to the contrary in the Outsourcing Software Management clause, Customer’s VDA E3 and E5 Licensed Users may remotely access Windows software under these Remote Virtualization rights on any Listed Provider’s Servers dedicated to Customer’s use.
AutoNDA by SimpleDocs

Related to Remote Virtualization

  • Remote Access Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.

  • Remote Work Remote work is the practice of performing required job functions from home or another management-approved location. Any employee who believes that all or part of their position is suitable for remote work may request to work remotely by submitting a written request to their supervisor. The Employer will evaluate the employee's request, and will approve or deny the request in writing. Employees whose requests to work remotely are approved may be required to sign an agreement confirming expectations regarding their schedule, timekeeping, remote work environment, data/information security and other matters specific to their position.

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Host A host where SSH server is activated. A port where SSH server is activated, by default it is 22.

  • Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.

  • Online Payments may be made online from the Money Matters tab in the Licensee’s Cal Poly Portal or at xxxx://xxx.xxx.xxxxxxx.xxx/student_accounts/online_payments.asp. Online payments can be made with either eCheck (with no added convenience fee) or credit card (with an added 2.75% convenience fee). Online payments received after 5:00 pm will be recorded as paid the following business day. If there are any problems making a payment online, contact the University Student Accounts Office at (000) 000-0000 or by email to xxxxxxxxxxxxxxx@xxxxxxx.xxx

  • Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section. 1.10.1 Registry Operator will offer searchability on the web-­‐based Directory Service. 1.10.2 Registry Operator will offer partial match capabilities, at least, on the following fields: domain name, contacts and registrant’s name, and contact and registrant’s postal address, including all the sub-­‐fields described in EPP (e.g., street, city, state or province, etc.). 1.10.3 Registry Operator will offer exact-­‐match capabilities, at least, on the following fields: registrar id, name server name, and name server’s IP address (only applies to IP addresses stored by the registry, i.e., glue records). 1.10.4 Registry Operator will offer Boolean search capabilities supporting, at least, the following logical operators to join a set of search criteria: AND, OR, NOT. 1.10.5 Search results will include domain names matching the search criteria. 1.10.6 Registry Operator will: 1) implement appropriate measures to avoid abuse of this feature (e.g., permitting access only to legitimate authorized users); and 2) ensure the feature is in compliance with any applicable privacy laws or policies.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!