User Administration Sample Clauses

User Administration. 8.1 Every participant shall appoint a MEPS+ administrator and an alternate administrator, whose duties are: (a) to create and delete users who are authorised to access the online information, query and control services; and (b) to define and maintain their security profiles and rights to access the services provided.
AutoNDA by SimpleDocs
User Administration. Premier View System allows for two options of user administration:
User Administration. Client is solely responsible for the administration, authorization and termination of all User identifications and passwords to access and use the Services. Client shall not permit Users to share User identifications and passwords, nor allow for multiple users under the same license. Client agrees to immediately notify SSG of any unauthorized use of the Services, or any other breach of security suspected or known to Client. Fees for the Services are based on the number of Users communicated to SSG. Client shall report to SSG no less than annually the number of Users. Any increase in the number of Users in excess of the established limit(s) in one or more Order Form will result in an increase in the annual Service Fees. Client may not decrease the number of licenses for its Users during the Term of the Order Form. Upon termination of an Order Form, all licenses granted to Client with respect to the Services under that Order Form shall automatically terminate and Client shall immediately discontinue its use thereof.
User Administration. Willxxxx XXXS will utilize a custom security application which will allow for access levels and users to be set on the Willxxxx Xxxinistrator Level, the Customer User Administrator level and the individual user level. The Willxxxx Xxxinistrator will be able to setup new customers and support the Customer User Administrators. Multiple organizational hierarchies can be set-up for CNMS to meet individual customers internal business situations and realities. o Customer administrators, and/or Willxxxx Administrators, can establish user "groups" and define the security privileges available to those groups within their organizational hierarchy. Users can be added and assigned to defined security "groups" within their organizational hierarchy. o CNMS requires users to enter a valid username and password to gain access to system features for which they are authorized. o Privileges within each group designation can be set down to the feature (function) level within the application. Read, insert, delete privileges are established for certain functions through a user group designation. The reliance on Customer User Administrators will allow Willxxxx xx keep administrative tasks and cost at a minimum while providing a comprehensive product feature set. The custom administrative application will allow Willxxxx XXXS to remain flexible with the addition of new features, user requirements and user levels.
User Administration. You are responsible for and bound by any Communication we receive in your name through the Service if the Communication: (i) comes from an Administrator or Authorized User; or (ii) is authenticated using security procedures, described herein, even if not authorized by you.
User Administration. The Administrator is responsible for setting up your Authorized Users. The Administrator is also responsible for assigning all persons with the Security Codes that are necessary to access the Service and for establishing what, if any, limitations will apply. The Administrator changes and maintains your Security Codes. The Administrator(s) will have full access to your Accounts and to any future Account you may open. We will not control or oversee the Administrator or any activity or function of an Administrator or other Authorized User. You agree to the creation of an Administrator and to all action taken by the Administrator. You agree to all action taken by any Authorized User and by any person given access to the Service by the Administrator or by an Authorized User. You further agree to assume all risks associated with providing Security Codes to your Administrator, understanding that this can result in Authorized Users and possibly other persons obtaining access to your Account without control or monitoring by us.
User Administration. The following table identifies the End User administration roles and responsibilities that ACS and Symetra will perform. 1. Develop and document requirements and policies regarding End User Administration X 2. Approve requirements and policies regarding End User Administration X 3. Receive and track requests for user account activation, changes and terminations X 4. Create, change and delete user accounts per requests in accordance with Symetra’s security policies. X 5. Coordinate as necessary with other specialized areas to manage End User accounts X 6. Reset passwords as required in accordance with Symetra’s security policies X
AutoNDA by SimpleDocs
User Administration. (i) User administration Services are those Functions related to managing and maintaining user accounts. Supplier shall perform the user administration Services, including coordinating as necessary with Health Net’s IT infrastructure department when performing Application Development Services. (ii) In the Supplier controlled environments such as application development, application test, and the offshore environments, Supplier must maintain diligence to remove unused accounts and maintain access rights for users who have transferred to other areas, in compliance with Health Net policies; and (iii) Supplier shall perform the user administration Services, including those Functions listed in the roles and responsibilities table below, except for those Functions that are expressly identified as retained Health Net responsibilities in the roles and responsibilities table below. 1. Request access to Health Net technology environment. X
User Administration. The System Integrator shall: (i) Implement Identity and Access Management (“IAM”) which accuratelydistinguishes and separates users by their identified roles and responsibilities, thereby establishing least privilege and ensuring that the users only have such permissions as may be necessary to perform the assigned tasks. (ii) Ensureadministration and management of usersas well as the root account(s),in such a manner which ensures that the identities and authorizations areproperly managed, as well as administrating any identity and IAM users, groups and roleswhich they associated with the user account. (iii) Offer fine-grained access controls including, conditions like time of the day, originating IP address, use of SSL certificates, or authentication with a multi-factor authentication device. (iv) Provide a mechanism to test the effects of access control policies that are attached to users, groups, and roles before committing the policies into production. Support a policy validator to automatically examine non-compliant access control policies. (v) Implement multi-factor authentication (“MFA”) for the root account, as well as any privileged IAM accounts associated with it.
User Administration. [CUSTOMER] agrees to provide services required to administer the user access to any hosted solutions, including user identification and user passwords in accordance with defined security policies, leveraging the Vendor’s authentication methods.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!