Security Requirements for System or Network Access Sample Clauses

Security Requirements for System or Network Access. Supplier shall comply with these security requirements (“Requirements”) to have access to AT&T’s computers, computer peripherals, computer communications networks, computer systems/applications/software, network elements and their support systems, and the information stored, transmitted, or processed using these resources (“Information Resources”). “
AutoNDA by SimpleDocs

Related to Security Requirements for System or Network Access

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • System Maintenance The Trust understands that USBFS will perform periodic maintenance to the System(s), which may cause temporary service interruptions. To the extent possible, USBFS shall notify the Trust of all planned outages and will perform any necessary maintenance during non-business hours.

  • Use of Subservicers and Subcontractors The Servicer shall not hire or otherwise utilize the services of any Subservicer to fulfill any of the obligations of the Servicer as servicer under this Agreement or any Reconstitution Agreement unless the Servicer complies with the provisions of paragraph (a) of this Section. The Servicer shall not hire or otherwise utilize the services of any Subcontractor, and shall not permit any Subservicer to hire or otherwise utilize the services of any Subcontractor, to fulfill any of the obligations of the Servicer as servicer under this Agreement or any Reconstitution Agreement unless the Servicer complies with the provisions of paragraph (b) of this Section.

  • Maintaining Records; Access to Properties and Inspections; Maintenance of Ratings (a) Keep proper books of record and account in which full, true and correct entries in conformity with GAAP and all requirements of law are made of all dealings and transactions in relation to its business and activities. Each Loan Party will, and will cause each of its subsidiaries to, permit any representatives designated by the Administrative Agent or any Lender to visit and inspect the financial records and the properties of such Person at reasonable times and as often as reasonably requested and to make extracts from and copies of such financial records, and permit any representatives designated by the Administrative Agent or any Lender to discuss the affairs, finances and condition of such Person with the officers thereof and independent accountants therefor.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Maintenance of Securities and Cash at Bank and Subcustodian Locations Unless Instructions specifically require another location acceptable to the Bank:

  • Security Against Unauthorized Use of Funds’ Recordkeeping Systems Financial Intermediary agrees to provide such security as is necessary to prevent any unauthorized use of the Funds’ recordkeeping system, accessed via (a) the world wide web or any URL maintained by the Funds or JPMDS, (b) a networking/data access arrangement or (c) computer hardware or software provided to Financial Intermediary by JPMDS.

  • Support Services Other than the assistance provided in the Information, the BNPP Entities do not offer any support services in connection with the Software.

  • Listing and Maintenance Requirements The Common Stock is registered pursuant to Section 12(b) or 12(g) of the Exchange Act, and the Company has taken no action designed to, or which to its knowledge is likely to have the effect of, terminating the registration of the Common Stock under the Exchange Act nor has the Company received any notification that the Commission is contemplating terminating such registration. The Company has not, in the 12 months preceding the date hereof, received notice from any Trading Market on which the Common Stock is or has been listed or quoted to the effect that the Company is not in compliance with the listing or maintenance requirements of such Trading Market. The Company is, and has no reason to believe that it will not in the foreseeable future continue to be, in compliance with all such listing and maintenance requirements.

Time is Money Join Law Insider Premium to draft better contracts faster.