System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.
Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.
Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.
Transmission and Routing of Exchange Access Traffic PURSUANT TO 251(c)(2) 13 ARTICLE VI MEET-POINT BILLING ARRANGEMENTS 14 ARTICLE VII BLV/BLVI TRAFFIC 16 7.1 Busy Line Verification 16 7.2 Busy Line Verification Interrupt 16 7.3 BLV/BLVI Traffic 16 7.4 BLV/BLVI Compensation 16
System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.
USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code. (b) Any Service Instructions identified by the Account Holder’s TBS Access Code shall be deemed to be given by the Account Holder and shall be conclusive and binding on the Account Holder and the Account Holder hereby authorises the Bank to act on any such Service Instructions identified by the Account Holder’s TBS Access Code. (c) All acts on the part of the Bank pursuant to such Service Instructions identified by the Account Holder’s TBS Access Code shall be conclusive and binding on the Account Holder (notwithstanding that such Service Instructions may not have been given by the Account Holder or with his consent or authority). (d) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled (but not obliged), in its reasonable discretion, to permit the Account Holder to operate the TBS without the use of his T-PIN upon verifying the identity of the Account Holder in accordance with the Bank’s prevailing prescribed procedure at the time. (e) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled, in its reasonable discretion, to refuse to act on all or any Service Instructions; and the Bank shall be entitled in its reasonable discretion to require written confirmation of the Account Holder’s Service Instructions (even where identified by the Account Holder’s TBS Access Code), and to refuse to act on any such Service Instructions unless and until such written confirmation is received by the Bank. (f) The use of any TBS and the TBS Access Code is also subject to the Bank’s terms and conditions governing the type of Account or facility of which the TBS may be operated in connection therewith and nothing in these terms and conditions shall be construed as amending or varying those terms and conditions. (g) The Bank shall at its reasonable discretion, be entitled to change, de- activate or revoke the use of the TBS Access Code at any time without giving any reason but with reasonable notice to the Account Holder.
System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.