Secure Access. Products that provide secure access to the network for any device, including personally owned mobile devices (laptops, tablets, and smart phones). Capabilities should include:
Secure Access. Contractor shall have all equipment, materials, and support necessary to remotely connect to the City servers and computers via a secure connection per City access protocols. The City will provide secure VPN access into the network to the Contractor as required. On-site access will also be provided as needed and as mutually agreed by the parties.
Secure Access. Subject to the Employer’s guidelines on secure access to its premises, the Employer shall, upon reasonable prior written notice, authorize access to its premises to authorized Union representatives so that they may ensure compliance with the provisions of this Agreement.
Secure Access. Licensee agrees to comply with Nuance security protocols and only access the Service via the activation URL and login credentials provided by Xxxxxx. You are solely responsible for maintaining the confidentiality and security of your login credentials and for all activities that occur on or through your Services account. You shall notify Xxxxxx immediately if you become aware of any unauthorized use of your login credentials. You shall not (a) share your login credentials or (b) use the login credentials of others to access the Service.
Secure Access. Customer shall keep the login names and the passwords required for the use of the SaaS Product confidential, to keep it in a safe place, and to protect it against unauthorized access by third parties with appropriate precautions, and to instruct its Authorized Users to do the same.
Secure Access. All HSDAs must utilize the head node xxx-xxxxx-xx.xxx.xxx, which is only accessible through USC networks and utilizes Duo two-factor authentication. To access these accounts outside of USC networks, members must use the ITS virtual private networking (VPN) application.
Secure Access. A. A security escort will be required whenever Winstar or its approved agent desires access to the roof after the one accompanied site visit allowed pursuant to Section 1D prior to completing BellSouth’s Security Training requirements as specified below. Rates for a security escort are assessed in one-half (1/2) hour increments according to the schedule as set forth in Section 20.31G of the BellSouth Virtual Expanded Interconnection Tariff.
B. The security and safety requirements set forth in this section are as stringent as the security requirements BellSouth maintains at its own premises either for their own employees or for authorized contractors. Only Winstar employees, BellSouth Certified Contractors and authorized employees, or authorized agents of Winstar will be permitted in the BellSouth Premises. Winstar shall provide its employees and agents with picture identification which must be worn and visible at all times while in areas in or around the Premises. The photo Identification card shall bear, at a minimum, the employee’s name and photo, and the Winstar name. BellSouth reserves the right to remove from its premises any employee of Winstar not possessing identification issued by Winstar or who have violated any of BellSouth’s policies as outlined in the CLEC Security Training documents. Winstar shall hold BellSouth harmless for any damages resulting from such removal of its personnel from BellSouth premises. Winstar shall be solely responsible for ensuring that any Guest of Winstar is in compliance with all subsections of this Section 4.
C. Winstar will be required, at its own expense, to conduct a statewide investigation of criminal history records for each Winstar employee being considered for work on the BellSouth Premises, for the states/counties where the Winstar employee has worked and lived for the past five years. Where state law does not permit statewide collection or reporting, an investigation of the applicable counties is acceptable.
D. Winstar will be required to administer to their personnel assigned to the BellSouth Premises security training either provided by BellSouth, or meeting criteria defined by BellSouth.
E. Winstar shall not assign to the BellSouth Premises any personnel with records of felony criminal convictions. Winstar shall not assign to the BellSouth Premises any personnel with records of misdemeanor convictions, except for misdemeanor traffic violations, without advising BellSouth of the nature and gravity of the o...
Secure Access. Pursuant to Section 11 of the Collocation Attachment. CLEC-1 is responsible for providing, running, and maintaining the cable from the radio frequency (RF) equipment to the collocation cage through the use of a BellSouth Certified Vendor. BellSouth transmission engineering bonding and grounding rules MUST be followed where the cable enters the central office and at the equipment location. BellSouth shall designate the point of entrance of the cable from the roof into the BellSouth Central Office building. BellSouth will be responsible for providing any necessary cable support structure at a rate indicated in Exhibit B. A BellSouth consultant must approve how the cable will be run.
Secure Access. Synrc may provide Services by remote access. Agreed place of execution is Synrc’s place of office. Synrc shall take economically reasonable and technically as well as organisationally feasible precautions so that the traffic between Synrc and the Customer is protected against unauthorized access by third parties.
Secure Access. Pursuant to Section 11 of the Physical Collocation Exhibit to the Interconnection Agreement.