Workstation OS and security management Sample Clauses

Workstation OS and security management. Service owner: ICT&MM service Customers: RBINS staff (broad interpretation, so including all staff that is registered by the RBINS HR department even if they are on an external payroll) and computers ordered by ICT&Multimedia on behalf of RBINS Summary: SLA version 1.0 – ICT&MM Service Page 31 Royal Belgian Institute of Natural Sciences to procure computers with secure, reliable and fully supported operating systems and protected against viruses Description: ICT&MM activities include:  For OS: ◦ decides on choice of OS used on RBINS computer (+ their version and language) Xxxxx and supported OS are: ▪ Windows XP and 7 (PC & laptop systems) UK ▪ MacOS X.6.x and X.7.x (Macintosh systems) UK Exceptions are only authorized when the use of specific OS (and/or version) is a requirement for the use of particular hardware or software. ◦ Testing, implementation, and deployment (when needed) of desktop operating system upgrades, patches and updates  to take care that desktops and laptops computers of the Institute are protected against viruses as well as possible by managing acquisition, installation, monitoring an anti- virus software suite  Making available the necessary tools and knowledge for the detection and elimination of malware (worms, trojans, malware, root kits, etc.) on desktop and laptop computers Customers responsibilities:  For users with admin rights: ◦ don't modify settings nor proceed to a new (re)installation, update or upgrade of the OS of their computer(s). Such tasks must be done by ICT&MM service ◦ don't modify settings nor disable the anti-virus software installed by ICT&MM on the RBINS computers  Contact the helpdesk to report problems with the desktop configuration or as soon as there is the slightest suspicion that a security issue has occurred SLA version 1.0 – ICT&MM Service Page 32 Royal Belgian Institute of Natural Sciences
AutoNDA by SimpleDocs

Related to Workstation OS and security management

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Mobile Banking Services Mobile Banking is a personal financial information management service that allows you to access account information and conduct transactions using compatible and supported mobile phones and/or other compatible and supported wireless devices (including phones, "Wireless Devices"). We reserve the right to modify the scope of the Mobile Banking services at any time. We reserve the right to refuse to make any transaction you request through Mobile Banking. You agree and understand that Mobile Banking may not be accessible or may have limited utility over some mobile telephone networks, such as while roaming.

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Project Management Services Contractor shall provide business analysis and project management services necessary to ensure technical projects successfully meet the objectives for which they were undertaken. Following are characteristics of this Service:

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to PCS for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers.

  • Telephone Monitoring and Recording You consent to and authorize us and any of our affiliates, agents and marketing associates to monitor and/or record any of your telephone conversations with any of our or their representatives for quality control, training and other lawful purposes.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

Time is Money Join Law Insider Premium to draft better contracts faster.