VPN access Sample Clauses

VPN access. Input controls
AutoNDA by SimpleDocs
VPN access. The University provides a virtual private network to enable secure remote access. Clients may be required to complete a new VPN form requesting permission to LOCKSS. Visit the T&C VPN site for additional information. Wireless Access: Over 300 wireless access points on campus provide wireless access for major campus facilities. Visit the T&C Wireless Access site for additional information. Service Description and Standards Operations Support Standards Overview The diagram in Figure 1 represents the process flow for LOCKSS operations support requests. There are 2 tiers in the support process, which are described in detail in the “Roles and Responsibilities” section below. Figure 1. Diagram of Operations Support Process By Request Roles & Responsibilities Tier 1 Support Tier 1 support will be provided by the following areas: Tier 1a- JSB Library Staff Tier 1b- JSB Library LOCKSS Administrator Tier 1c- LOCKSS Customer Support All Tier 1 support personnel provide basic troubleshooting. This includes the following tasks: Repeat the transaction, and verify that the problem happens again. If it is a LOCKSS-related issue, that cannot be resolved and/or answered by the Library Staff and/or the CI LOCKSS Administrator, LOCKSS Customer Service will be contacted by the CI LOCKSS Administrator. If completion of basic troubleshooting does not solve issue, Tier 1 support will document sufficient information and report the problem to Tier 2 support via completion of a T&C Help Desk Ticket Request or email request to xxxxxxxx@xxxxx.xxx Tier 2 Support Tier 2 support will be tracked, monitored, and routed to the appropriate Infrastructure Subject Matter Expert via CI’s T&C Help Desk. Tier 2 provides enhanced troubleshooting for issues that cannot be resolved by Tier 1 support. This includes the following tasks: Contact CI LOCKSS Administrator and/or LOCKSS Customer Support as necessary to resolve problem Provide both technical and non-technical solutions for issues to the extent of knowledge and capabilities. Research and gather information Document additional steps performed to resolve issue Maintain documentation on issue resolution Work with Tier 1 support to research and troubleshoot issues. Work with a range of vendors/manufacturers to resolve technical issues. Serve as a liaison between Tier 1 and vendor/manufacturer, if explicitly requested by Tier 1 support. If Tier 2 support is unable to solve issue, Tier 2 support will escalate request back to Tier 1 Support with re...

Related to VPN access

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Open Access Same-Time Information System (OASIS): The information system and standards of conduct contained in Part 37 and Part 38 of the Commission’s regulations and all additional requirements implemented by subsequent Commission orders dealing with OASIS.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Customer Access The Customer is responsible for the access to the Cloud Services and is responsible for maintaining the confidentiality of its access methods such as usernames and passwords and agrees to notify the Supplier via the Cloud Services support channel if a password is compromised. The Customer is responsible for all activities that occur under its Account.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Cash Access You may not use the Gift Card to obtain cash from an Automated Teller Machine (“ATM”), Point-of-Sale (“POS”) device, or by any other means. You may not use the Gift Card at an ATM. Loading The Gift Card The Gift Card is not reloadable after being loaded at the time of purchase. Personal checks, cashier’s checks, and money orders sent to the Issuer are not an acceptable form of loading. Any checks and money orders sent to the Issuer for loading will be returned unless the full amount may be applied towards a negative balance, in which case the check or money order may or may not be loaded at the discretion of the Issuer. The maximum dollar value of the Gift Card is printed on the front side of the Gift Card packaging. These are the limits associated with loading the Gift Card: Transaction Type Frequency and/or Dollar Limits Initial Load One time $20.00 up to $500.00 For Gift Card balance information, please call 0-000-000-0000 or visit XxxxxxxXxxx.xxx.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

Time is Money Join Law Insider Premium to draft better contracts faster.