Security Administration Sample Clauses

Security Administration. When a Security Procedure is required to access a Service or authenticate instructions, you agree to appoint an Administrator with the authority to determine who will be authorized to use the Services on your behalf. You assume sole responsibility for the actions of your Administrator, the authority he or she gives others to act on your behalf, and the actions of the persons designated by the Administrator to use the Services. You or your Administrator will designate which accounts will be used for Service payments and transfers. If your Administrator designates an account that requires more than one signature for the withdrawal or transfer of funds, you agree that we may act upon any Service instruction that is accompanied by the password or Personal Identification Number designated by you or your Administrator for that account and the Service in question.
AutoNDA by SimpleDocs
Security Administration. Provide system software and hardware security controls. X X
Security Administration. This Task Order involves no classified information.
Security Administration. Subject to the Change Order Process, OneNeck shall generate and issue operating system User IDs, passwords, and access privileges for indicated individuals in accordance with Client-provided SOX controls upon request by authorized Client personnel or site administrator.
Security Administration. (a) Without limiting the authority of Agent hereafter to act or to appoint others to act as agent for itself and the Lenders under this Agreement and other Loan Documents, pursuant to subsection 10.2, Agent is authorized to assign and delegate to an agent (the "Collateral Agent") some or all of Agent’s rights and duties in respect of Security, including without limitation, the administration of the Initial Borrowing Base, the Second Borrowing Base and the Secured Borrowing Base as contemplated by Exhibit I, and Agent and the Lenders agree that Section 10 of this Agreement shall apply to any Collateral Agent in respect of the Security as if Section 10 were restated in full in favor of Agent and any Collateral Agent, as applicable. Agent is authorized, directly or indirectly, to acquire, hold and enforce Liens on Security and to exercise related powers and perform such related duties in respect of Security, together with such other powers as are reasonably incidental thereto. Except to the extent expressly provided in this Agreement or any other Loan Document with respect to Security, neither Agent nor any of its agents in such capacity shall have any duties or responsibilities or any fiduciary relationship with any Lender, and no implied covenants, functions, responsibilities, duties, obligations or liabilities shall be read into this Agreement or any other Loan Document or otherwise exist against Agent or any of its agents. (b) References to Agent in this Agreement and the other Loan Documents include, as applicable, references to agents of Agent, including any Collateral Agent, and references to Lenders entitled to the benefit of Security include, without limitation, Agent and its agents. Each Person acting as agent for Agent shall be (i) entitled to the same benefits of the indemnification, waiver and other protective provisions to which Agent is entitled under this Agreement (including, without limitation, the right to resign pursuant to subsection 10.10), (ii) entitled to take actions in its own name, including, without limitation, the creation and termination of Liens on Security by any Collateral Agent in accordance with this Agreement, and (iii) subject to removal by Agent, in its sole discretion, or by the Required Lenders in accordance with subsection 10.10. (c) Each Lender hereby irrevocably authorizes and directs Agent, directly or indirectly, to (i) enter into the Security Documents for the benefit of such Lender and hereby agrees that any acti...
Security Administration. (i) Supplier shall provide security administration support for all applications and systems supported by Supplier. Supplier shall provide an assigned point of contact (POC) for Information Security support of each application/system. (ii) Each assigned POC will coordinate Supplier support for the security requirements detailed in this document with INFOSEC. They will act as the primary POCs for the notification and response for security vulnerabilities, will coordinate collection of information for each system/application, and will act as the primary POC for any audit/assessment-related activities for each supported system/application.
Security Administration. 3.1 The Processor shall track, co-ordinate, implement, manage and maintain all security changes across the Services Environment. 3.2 The Processor shall limit the risk of unauthorised access to the Services Environment including content filtering to prevent objectionable material, virus protection, password controls and physical security. The Processor shall have regard to the confidentiality and sensitivity contained within the Services Environment and shall ensure that measures applicable to the UK health and social care sector are in place to prevent unauthorised access.
AutoNDA by SimpleDocs
Security Administration. 6.1. BNYM will, in connection with the BNYM systems used to provide the services : 6.1.1. review all documented information security procedures with the Fund pertaining to BNYM-operated systems; 6.1.2. develop, maintain, update and implement security procedures in accordance with BNYM’s change management processes; 6.1.3. monitor users of BNYM‘ s systems and services for authorized access, and monitor, review and respond in a timely and appropriate manner to access violations according to BNYM processes; 6.1.4. conduct periodic reviews, as appropriate, to validate individual employee access to programs and libraries following BNYM processes; 6.1.5. capture data regarding routine access and exceptions for audit trail purposes in accordance with the BNYM Policies, at a minimum; 6.1.6. perform security audits, provide incident investigation support and initiate corrective actions to minimize and prevent security breaches; 6.1.7. maintain reasonable summary reports on relevant violation and access attempts, and retain documentation of the investigation; 6.1.8. install, update and maintain software that will provide security monitoring , alarming and access tracking functionality for BNYM-operated systems and software following BNYM change control and management procedures ; 6.1.9. provide security access control tools for data, software and networks in compliance with the BNYM Policies, at a minimum, and maintain such security and access control devices in proper working order; 6.1.10. establish and administer procedures to monitor and control remote data communication access to Fund Data;
Security Administration. ACT shall add and maintain any JCTO required security roles based on specifications supplied by JCTO for the ACT System. JCTO shall setup and maintain User IDs for the ACT System. JCTO, or ACT upon direction from JCTO, shall assign users to roles. JCTO shall assign Entitlements to users for the ACT System. As ACT enhances front-end security functionality to allow for JCTO personnel to assume more security related responsibilities, JCTO shall assume these responsibilities, with ACT training and / or assistance as needed.
Security Administration. All Trust user IDs and passwords stored at the Bank’s site shall be encrypted and adhere to the same rules as for the storage of any other Electronic Information. Security administration for stored Trust user IDs and passwords must be agreed upon between Trust and the Bank in order to avoid unauthorized access, changes, additions and/or deletions and to maintain proper controls.”
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!