Security and Access Control Sample Clauses

Security and Access Control. Advanced security systems monitor the entire data centre 24x7. A closed circuit television system (CCTV) records and archives all activities. Each person accessing the data centre must provide valid identification and is registered when entering and leaving the premises.
AutoNDA by SimpleDocs
Security and Access Control. ShadowVoice offers reliable, full featured hosted VoIP and SIP trunking for businesses from one line to thousands. Enterprise Systems offers a variety of security and access control solutions. Security License # B19521
Security and Access Control. 5.1.4.8 Overall, the BEAP’s security should comply with the following: - Government’s Security Regulations - Baseline IT Security Policy - IT Security Guidelines - OGCIO Interoperability Framework - Security Risk Assessment and Audit Guidelines
Security and Access Control. 10.1 The Trustees might employ a security company to manage the security of the Scheme and to control access to and from the Scheme
Security and Access Control. If you elect to install software on a wide area network or at a third-party data center, you must retain control of access to and use of the software by your users, and the hosting facility must use current industry standard security, encryption and protection mechanisms to prevent unauthorized access to the Software.
Security and Access Control 

Related to Security and Access Control

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Control and Access to Information The Financial Mechanism Committee, the EFTA Board of Auditors and their representatives have the right to carry out any technical or financial mission or review they consider necessary to follow the planning, implementation and monitoring of programmes and projects as well as the use of funds. The Beneficiary State shall provide all necessary assistance, information and documentation.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Records Retention and Access The Contractor shall maintain accurate, current, and complete records of the financial activity of this Contract which sufficiently and properly document and calculate all charges billed to the Agency throughout the term of this Contract and for a period of at least five (5) years following the date of final payment or completion of any required audit (whichever is later). If any litigation, claim, negotiation, audit or other action involving the records has been started before the expiration of the five (5) year period, the records must be retained until completion of the action and resolution of all issues which arise from it, or until the end of the regular five (5) year period, whichever is later. The Contractor shall permit the Agency, the Auditor of the State or any other authorized representative of the State and where federal funds are involved, the Comptroller General of the United States or any other authorized representative of the United States government, to access and examine, audit, excerpt and transcribe any directly pertinent books, documents, papers, electronic or optically stored and created records or other records of the Contractor relating to orders, invoices or payments or any other documentation or materials pertaining to this Contract, wherever such records may be located. The Contractor shall not impose a charge for audit or examination of the Contractor’s books and records. Based on the audit findings, the Agency reserves the right to address the Contractor’s board or other managing entity regarding performance and expenditures. When state or federal law or the terms of this Contract require compliance with OMB Circular A-87, A-110, or other similar provision addressing proper use of government funds, the Contractor shall comply with these additional records retention and access requirements:

  • Records Maintenance and Access Grantee must maintain all financial records relating to this Grant in accordance with generally accepted accounting principles. In addition, Grantee must maintain any other records, whether in paper, electronic or other form, pertinent to this Grant in such a manner as to clearly document Grantee’s performance. All financial records and other records, whether in paper, electronic or other form, that are pertinent to this Grant, are collectively referred to as “Records.” Grantee acknowledges and agrees Agency and the Oregon Secretary of State's Office and the federal government and their duly authorized representatives will have access to all Records to perform examinations and audits and make excerpts and transcripts. Grantee must retain and keep accessible all Records for a minimum of six (6) years, or such longer period as may be required by applicable law, following termination of this Grant, or until the conclusion of any audit, controversy or litigation arising out of or related to this Grant, whichever date is later.

  • Inclusion and accessibility The institution will provide support to incoming mobile participants with fewer opportunities, according to the requirements of the Erasmus Charter for Higher Education. Information and assistance can be provided by the following contact points and information sources: Country Available infrastructure adjusted for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- xxxx://xxx.xxxxxxxxx.xxxx.xx/?la ng=en Country Available support services for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- ---

Time is Money Join Law Insider Premium to draft better contracts faster.