Secure/Remote Access Sample Clauses

Secure/Remote Access. All access and use of the Service must be made via a secure network and secure authentication methods. Use of the Service by remote access is allowed unless otherwise stated on the Order Form. Customer will strictly limit any remote access to its Authorized Users through the use of secure methods of user verification. Customer will promptly notify ProQuest if Xxxxxxxx believes security has been compromised. Posting or sharing of passwords, or otherwise enabling access for the benefit of non-subscribing institutions or users, is strictly prohibited.
AutoNDA by SimpleDocs
Secure/Remote Access. All access and use of the Service must be made via a secure network and secure authentication methods. Use of the Service by remote access is allowed unless otherwise stated on the Order Form. Customer will strictly limit any remote access to its Authorized Users through the use of secure methods of user verification. Customer will promptly notify ProQuest if Xxxxxxxx believes security has been compromised. Posting or sharing of passwords, or otherwise enabling access for the benefit of non-subscribing institutions or 3. Accès sécurisé/accès à distance. Tout accès au service ou usage du service doit être effectué via une connexion et des méthodes d’authentification sécurisées. L’usage du service via une connexion à distance est autorisé sauf stipulation contraire sur le Formulaire de commande. Le Client limitera strictement tout accès à distance à ses seuls Utilisateurs autorisés grâce à l’usage de méthodes sécurisées de vérification des utilisateurs. Le Client notifiera promptement ProQuest s’il pense que la sécurité a été compromise. La publication ou le partage de mots de passe ainsi que tout autre action permettant users, is strictly prohibited. l’accès au service à des institutions ou à des utilisateurs non abonnés sont strictement interdits.
Secure/Remote Access. The KSC Secure Remote Access Services (SRAS) subsystem is a collection of remote access services that permit access to the KSC/NASA IT infrastructure from locations external to the Center. These remote access services include basic dial-in modem access service via analog Plain Old Telephone Service (POTS)/ISDN digital lines and redundant dial-in servers (Cisco 37xx class routers with single PRI interfaces), a limited services functionality Secure Sockets Layer (SSL) based Virtual Private Networking (VPN) solution using the Agency standard web browsers as access clients (using redundant Juniper Networks Access 6000 series SSL VPN gateways), and an Internet Protocol Security (IPSEC) client based VPN gateway services using a set of redundant Cisco 3000 series VPN concentrators. This IPSEC client based service provides both full remote host connectivity, as well as a subset of that connectivity to certain remote user groups, based on group access profiles, and ultimately will perform full remote client configuration auditing via network admission control agents. This full VPN client is supported in Windows, MacOS X, and Linux environments. A redundant Remote Authentication Dial In User Service (RADIUS) system, based on the Juniper/Funk Global Enterprise Edition RADIUS software application running on Intel based server platforms, provides basic DHCP, account logging, and pass-through authentication functions for these SRAS components. Secondary support servers providing Microsoft (MS) Windows Internet Naming Services (WINS) and Domain Name Services are also functional within this subsystem. A two-factor authentication system based on the COTS RSA Security SecurID hardware tokens and redundant ACE servers running on Solaris based servers provides two factor authentication for the SRAS servers. Although this system primarily provides authentication for the SRAS components, it also provides strong authentication for selected systems across the Center, such as the KSC “TechDoc” document management system. Ultimately, this system will be passing the authentication requests to either the NASA Consolidated Active Directory (NCAD) or Agency Enterprise Authentication systems for final user authentications/authorization. These two-factor strong authentication services are also utilized with the on-board ACE Server TACACS+ server daemon built into the redundant ACE Servers to provide centralized strong network authentication to the individual components of the Network Sec...
Secure/Remote Access. (…) Use of the Service by remote access is allowed (…) Online posting of passwords, or otherwise enabling access for the benefit of non‐subscribing institutions or users, is strictly prohibited. […] Exhibit A: Permitted Uses
Secure/Remote Access. Secure Remote Access Services are NuArx Services that enable Users to connect to corporate Workstations from physical locations outside a Site. Secure Remote Access software may be installed on up to three (3) Workstations per Site, for the purpose of connecting Users to the Customer Workstations at that Site.
Secure/Remote Access. Third Party shall employ two-factor authentication for all remote access to internal and confidential information and systems.

Related to Secure/Remote Access

  • Remote Access Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.

  • Host-Remote When a CenturyLink Wire Center is served by a Remote Switch, CLEC may deliver traffic to the host Central Office or to the Tandem Switch. CLEC may not directly trunk to a Remote Switch. 7.2.2.10 Testing

  • Violations - Remote Scaling Requirement If PURCHASER violates any of the log accountability requirements of this contract, STATE may require all logs from timber sold under the terms and conditions of this contract to be scaled at a ramp provided by PURCHASER, in a location designated by STATE. All costs associated with this additional scaling requirement shall be paid by PURCHASER. Cost of Scaling. All costs of scaling and all costs in connection with reports furnished to STATE shall be paid by PURCHASER. PURCHASER shall require the scaling organization to furnish copies each week to STATE of all scaled certificates showing gross and net volumes, by species and grade, of all logs scaled during the week. Upon request by STATE, PURCHASER shall also require the scaling organization to furnish and attach a log detail listing to each weekly scale certificate showing all STATE logs included on the certificate. Scaling Instructions. PURCHASER agrees that STATE shall provide instructions to the approved third-party scaling organization for the scaling practices to be used for timber removed from the timber sale area. Instructions shall conform to the terms of this contract, including special scales as necessary. PURCHASER shall acknowledge and sign such instructions and shall be provided a copy. Minimum Products Specifications and Special Scale information are shown on Exhibit G. Logs Damaged During Handling. Mechanical damage to logs shall be prevented during log handling. Deductions for handling damage shall not be allowed. Add-Back Volume. Scaling deduction for deterioration due to abnormal delay in removal of logs from the timber sale area shall not be allowed in determining net volume. Volume of material deteriorated due to delay in removal shall be reported to STATE and paid for at the contract price. Cost for separate reports shall be paid by PURCHASER. Special Scaling Instructions. Segment scaling or grading of logs in excess of 40 feet in gross scaling length shall use actual taper. Procedures are set forth in "Segment Scaling and Grading of Long Logs - All Species - State Forestry Department Scaling Instructions" (Westside).

  • Remote Work Remote work is the practice of performing required job functions from home or another management-approved location. Any employee who believes that all or part of their position is suitable for remote work may request to work remotely by submitting a written request to their supervisor. The Employer will evaluate the employee's request, and will approve or deny the request in writing. Employees whose requests to work remotely are approved may be required to sign an agreement confirming expectations regarding their schedule, timekeeping, remote work environment, data/information security and other matters specific to their position.

  • Inventory Report – Remote Premises The locations of the Remote Premises (e.g., Feeder Distribution Interfaces, "FDI") and the End User Customer addresses served by each Remote Premises are available to CLEC through the Raw Loop Data Tool. Remote Premises with digital loop carrier and pair gain equipment will be provided on the web site in the ICONN database. (ICONN is available through the Qwest web site located at xxxx://xxx.xxxxx.xxx/iconn.) If CLEC is unable to determine the information it seeks regarding the Remote Premises after using such database tools, Qwest will provide CLEC with a report that contains the information. The Parties agree that a charge may apply to such report, based on time and material, unless the database information is inaccurate or unusable for the Remote Premises then no charge would apply. Qwest will provide CLEC access to relevant plats, maps, engineering records and other data in accordance with Section 10.8.2.4. In addition, CLEC can request a copy of Qwest's distribution area map associated with the Remote Premises, with a charge for time and material.

  • Remote Support 3.11.1 Remote Support, covering telephone support at minimum, is mandatory, when and throughout the period the Software is being used at Live State, unless otherwise agreed in writing between HW and the Licensee.

  • Remote Terminal Unit Prior to the Initial Synchronization Date of the Large Generating Facility, a Remote Terminal Unit, or equivalent data collection and transfer equipment acceptable to the Parties, shall be installed by Developer, or by Connecting Transmission Owner at Developer’s expense, to gather accumulated and instantaneous data to be telemetered to the location(s) designated by Connecting Transmission Owner and NYISO through use of a dedicated point-to-point data circuit(s) as indicated in Article 8.1. The communication protocol for the data circuit(s) shall be specified by Connecting Transmission Owner and NYISO. Instantaneous bi-directional analog real power and reactive power flow information must be telemetered directly to the location(s) specified by Connecting Transmission Owner and NYISO. Each Party will promptly advise the appropriate other Party if it detects or otherwise learns of any metering, telemetry or communications equipment errors or malfunctions that require the attention and/or correction by that other Party. The Party owning such equipment shall correct such error or malfunction as soon as reasonably feasible.

  • Child Support Payments Child Support payments for the Children Outside the Couple shall be made by the ☐ Husband ☐ Wife to the ☐ Husband ☐ Wife in payments of $ due each month commencing on the 1st of the month following a petition for Divorce being filed in the jurisdiction of Governing Law (“Child Support”). Child Support shall continue until the first of the following events:

  • Remote Call Forwarding 4.2.10.1 As an option, BellSouth shall make available to CCI an unbundled port with Remote Call Forwarding capability (“URCF service”). URCF service combines the functionality of unbundled local switching, tandem switching and common transport to forward calls from the URCF service telephone number (the number dialed by the calling party) to another telephone number selected by the URCF service subscriber. When ordering URCF service, CCI will ensure that the following conditions are satisfied:

  • CONTRACTING BODY SATISFACTION MONITORING 18.1 The Authority may from time to time undertake (or procure the undertaking of) a Contracting Body satisfaction survey ("Contracting Body Satisfaction Survey") the purpose of which shall include:

Time is Money Join Law Insider Premium to draft better contracts faster.