Separation of Duties / Access Controls Sample Clauses

Separation of Duties / Access Controls. The Contractor must ensure that all NYS Confidential Information that it holds under this Contract is stored in a controlled access environment to ensure data security and integrity. Contractor will provide the State a list of the physical locations where Contractor has stored any NYS Confidential Information at any given time and will update that list if the physical location changes. All Contractor facilities must have adequate security systems in place to protect against the unauthorized access to such facilities and data stored therein. Access into and within such facilities must be restricted by Contractor through an access control system that requirespositive identification of authorized individuals as well as maintains a log of all accesses (e.g., date and time of the event, type of event, user identity, component of the information system, outcome of the event). The Contractor shall have a formal procedure in place for granting computer system access to NYS Confidential Information and to track access. Contractor access to NYS Confidential Information for any types of projects outside of those approved by ITS are prohibited. ITS requires the Contractor to follow security best practices by adhering to separation of job duties, and limiting Contractor staff knowledge of NYS Confidential Information to that which is absolutely needed to perform job duties. Upon request, Contractor will provide documentation to ITS clearly defining the security roles and access levels for each of its staff working with NYS Confidential Information with a level of specificity objectively reasonable to and approved by ITS.
AutoNDA by SimpleDocs
Separation of Duties / Access Controls. The Contractor must ensure that all NYS Confidential Information that it holds under this Contract is stored in a controlled access environment to ensure data security and integrity. Contractor will provide the State a list of the physical locations where Contractor has stored any NYS Confidential Information at any given time and will update that list if the physical location changes. All Contractor facilities must have adequate security systems in place to protect against the unauthorized access to such facilities and data stored therein. Access into and within such facilities must be restricted by Contractor through an access control system that requires positive identification of authorized individuals as well as maintains a log of all accesses (e.g., date and time of the event, type of event, user identity, component of the information system, outcome of the event). The Contractor shall have a formal procedure in place for granting computer system access to NYS Confidential Information and to track access. Contractor access to NYS Confidential Information for any types of projects outside of those approved by ITS are prohibited. ITS requires the Contractor to follow security best practices by adhering to separation of job duties, and limiting Contractor staff knowledge of NYS Confidential Information to that which is absolutely needed to perform job duties. Upon request, Contractor will provide documentation to ITS clearly defining the security roles and access levels for each of its staff working with NYS Confidential Information with a level of specificity objectively reasonable to and approved by ITS.
Separation of Duties / Access Controls. The Contractor must ensure that all BRETSA Confidential Information that it holds under this Agreement is stored in a controlled access environment to ensure data security and integrity. Contractor will provide BRETSA a list of the physical locations where Contractor has stored any BRETSA Confidential Information at any given time and will update that list if the physical location changes. All Contractor facilities must have adequate security systems in place to protect against the unauthorized access to such facilities and data stored therein. Access into and within such facilities must be restricted by Contractor through an access control system that requires positive identification of authorized individuals as well as maintains a log of all accesses (e.g., date and time of the event, type of event, user identity, component of the information system, outcome of the event). The Contractor shall have a formal procedure in place for granting computer system access to BRETSA Confidential Information and to track access. Contractor access to BRETSA Confidential Information for any types of projects outside of those approved by BRETSA are prohibited. BRETSA requires the Contractor to follow security best practices by adhering to separation of job duties, and limiting Contractor staff knowledge of BRETSA Confidential Information to that which is absolutely needed to perform job duties. Upon request, Contractor will provide documentation to BRETSA clearly defining the security roles and access levels for each of its staff working with BRETSA Confidential Information with a level of specificity objectively reasonable to and approved by BRETSA.

Related to Separation of Duties / Access Controls

  • Separation of Duties The Authorized User Agreement may require the separation of job duties, and that Contractor staff knowledge of Data be limited to that which is absolutely needed to perform job duties.

  • Delegation of Duties The Administrative Agent may execute any of its duties under this Agreement and the other Loan Documents by or through agents or attorneys-in-fact and shall be entitled to advice of counsel concerning all matters pertaining to such duties. The Administrative Agent shall not be responsible for the negligence or misconduct of any agents or attorneys in-fact selected by it with reasonable care.

  • STATEMENT OF DUTIES 56.01 Upon written request, an employee shall be provided with a complete and current statement of the duties and responsibilities of his or her position, including the classification level and, where applicable, the point rating allotted by factor to his or her position, and an organization chart depicting the position’s place in the organization.

  • Extent of Duties Each Agent shall only be obliged to perform the duties set out herein and such other duties as are necessarily incidental thereto. No Agent shall:

  • Certification Regarding Termination of Contract for Non-Compliance (Tex Gov. Code 552.374)

  • Transition of Services Upon request by the State prior to expiration or earlier termination of this Contract or any Services provided in this Contract, Contractor shall provide reasonable and necessary assistance to accomplish a complete transition of the Services from Contractor to the State or any replacement provider designated solely by the State without any interruption of or adverse impact on the Services. Contractor shall cooperate fully with the State or any successor provider and shall promptly take all steps required to assist in effecting a complete transition of the Services designated by the State. All services related to such transition shall be performed at no additional cost beyond what would be paid for the Services in this Contract.

  • Performance of Duties Each of the Credit Party’s obligations under this Agreement and each of the other Loan Documents shall be performed by such Credit Party at its sole cost and expense.

  • Protection from Unauthorized Use Licensee shall secure that Participating Institutions will use reasonable efforts to restrict access to the Licensed Materials to Authorized Users.

  • EMPLOYMENT OF UNAUTHORIZED ALIENS PROHIBITED In accordance with §2.2-4311.1 of the Code of Virginia, as amended, the Contractor must not during the performance of this Contract knowingly employ an unauthorized alien, as that term is defined in the federal Immigration Reform and Control Act of 1986.

  • Complete Disposal Upon Termination of Service Agreement Upon Termination of the Service Agreement Provider shall dispose or delete all Student Data obtained under the Service Agreement. Prior to disposition of the data, Provider shall notify LEA in writing of its option to transfer data to a separate account, pursuant to Article II, section 3, above. In no event shall Provider dispose of data pursuant to this provision unless and until Provider has received affirmative written confirmation from LEA that data will not be transferred to a separate account.

Time is Money Join Law Insider Premium to draft better contracts faster.