Controlling Electronic access to the EP Sample Clauses

Controlling Electronic access to the EP. Computer access to the EP must be controlled through a central policy and, as a basic principle, user access should be limited to the minimum required for performance of duties. User rights to the EP (both electronic and physical) should be routinely reviewed and adjusted. This should be a part of the company’s staff induction and Staff leaver procedures. Data must only be retained for as long as is required – A policy should be in place to ensure that redundant data is removed from systems as quickly as is practicable. Passwords should be known only to authorised people and the passwords changed regularly. Ideally such password changes must be mandatory and must prevent re-use of a previously used password. Passwords should be “strong”. Ideally containing numeric characters, a mixture of upper and lower case, not based on a dictionary word and a minimum of 8 characters. Administrator accounts should have stronger passwords. Passwords with a character length of 12 or more should be considered Laptop and other portable computers containing EP information must have full disk encryption. Key system documentation should be protected from unauthorised access. Network devices (Computers, Laptops and Servers) must be protected from virus and other malware attack by suitable software. This should be updated as frequently as necessary to retain good protection. All computers containing the EP must be set to require passwords if left unattended for more than 15 minutes. Unauthorised devices should be prevented from attaching to the network by suitable end- point security software. These devices should include any device capable of storing data i.e. memory sticks, MP3 players & I-PAD’s, cameras, mobile telephones etc. Restricting physical access to wireless networks is difficult and therefore the use of such networks should be discouraged, but where implementation is unavoidable then strong encryption must be used with frequent key changes. The use of WEP (Wireless Encrypted Protocol) is unacceptable for securing a wireless network. Consider using WPA-2 AES(Wi-Fi Protected Access) with strong access controls as a standard. IT systems should be adequately maintained. It is important that such systems have the latest security patches applied. Are all data backups must be securely stored and encrypted.
AutoNDA by SimpleDocs

Related to Controlling Electronic access to the EP

  • Electronic Access Access by the Customer to certain systems, applications or products of Bank shall be governed by this Agreement and the terms and conditions set forth in Annex A Electronic Access.

  • Electronic Visit Verification ("EVV Provider shall cooperate with State requirements for electronic visit verification for personal care services and home health services, as applicable.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • ELECTRONIC FUNDS TRANSFER (EFT The recipient/cooperator shall designate a financial institution or an authorized payment agent through which a federal payment may be made in accordance with US Treasury Regulations, Money and Finance at 00 XXX 000, which requires that federal payments are to be made by EFT to the maximum extent possible. A waiver may be requested and payments received by check by certifying in writing that one of the following situations apply:

  • Electronic Execution; Electronic Records; Counterparts This Agreement, any Loan Document and any other Communication, including Communications required to be in writing, may be in the form of an Electronic Record and may be executed using Electronic Signatures. Each of the Borrowers and each of the Administrative Agent and each Credit Party agrees that any Electronic Signature on or associated with any Communication shall be valid and binding on such Person to the same extent as a manual, original signature, and that any Communication entered into by Electronic Signature, will constitute the legal, valid and binding obligation of such Person enforceable against such Person in accordance with the terms thereof to the same extent as if a manually executed original signature was delivered. Any Communication may be executed in as many counterparts as necessary or convenient, including both paper and electronic counterparts, but all such counterparts are one and the same Communication. For the avoidance of doubt, the authorization under this paragraph may include, without limitation, use or acceptance of a manually signed paper Communication which has been converted into electronic form (such as scanned into .pdf format), or an electronically signed Communication converted into another format, for transmission, delivery and/or retention. The Administrative Agent and each of the Credit Parties may, at its option, create one or more copies of any Communication in the form of an imaged Electronic Record (“Electronic Copy”), which shall be deemed created in the ordinary course of such Person’s business, and destroy the original paper document. All Communications in the form of an Electronic Record, including an Electronic Copy, shall be considered an original for all purposes, and shall have the same legal effect, validity and enforceability as a paper record. Notwithstanding anything contained herein to the contrary, neither the Administrative Agent, the L/C Issuers nor Swing Line Lender is under any obligation to accept an Electronic Signature in any form or in any format unless expressly agreed to by such Person pursuant to procedures approved by it; provided, further, without limiting the foregoing, (a) to the extent the Administrative Agent, L/C Issuers and/or Swing Line Lender has agreed to accept such Electronic Signature, the Administrative Agent and each of the Credit Parties shall be entitled to rely on any such Electronic Signature purportedly given by or on behalf of any Borrower and/or any Credit Party without further verification and (b) upon the request of the Administrative Agent or any Credit Party, any Electronic Signature shall be promptly followed by such manually executed counterpart. Neither the Administrative Agent, L/C Issuers nor Swing Line Lender shall be responsible for or have any duty to ascertain or inquire into the sufficiency, validity, enforceability, effectiveness or genuineness of any Loan Document or any other agreement, instrument or document (including, for the avoidance of doubt, in connection with the Administrative Agent’s, L/C Issuers’ or Swing Line Lender’s reliance on any Electronic Signature transmitted by telecopy, emailed .pdf or any other electronic means). The Administrative Agent, L/C Issuers and Swing Line Lender shall be entitled to rely on, and shall incur no liability under or in respect of this Agreement or any other Loan Document by acting upon, any Communication (which writing may be a fax, any electronic message, Internet or intranet website posting or other distribution or signed using an Electronic Signature) or any statement made to it orally or by telephone and reasonably believed by it to be genuine and signed or sent or otherwise authenticated (whether or not such Person in fact meets the requirements set forth in the Loan Documents for being the maker thereof). Each of the Borrowers and each Credit Party hereby waives (i) any argument, defense or right to contest the legal effect, validity or enforceability of this Agreement and any other Loan Document based solely on the lack of paper original copies of this Agreement and/or such other Loan Document, and (ii) any claim against the Administrative Agent, each Credit Party and each Related Party for any liabilities arising solely from the Administrative Agent’s and/or any Credit Party’s reliance on or use of Electronic Signatures, including any liabilities arising as a result of the failure of the Borrowers to use any available security measures in connection with the execution, delivery or transmission of any Electronic Signature.

  • Reliance on Electronic Instructions If the Trust has the ability to originate electronic instructions to GFS in order to (i) effect the transfer or movement of cash or Shares or (ii) transmit Shareholder information or other information, then in such event GFS shall be entitled to rely on the validity and authenticity of such instruction without undertaking any further inquiry as long as such instruction is undertaken in conformity with security procedures established and agreed upon by GFS and the Fund’s investment adviser.

  • Incident Event and Communications Management a. Incident Management/Notification of Breach - Transfer Agent shall develop, implement and maintain an incident response plan that specifies actions to be taken when Transfer Agent or one of its subcontractors suspects or detects that a party has gained material unauthorized access to Fund Data or systems or applications containing any Fund Data (the “Response Plan”). Such Response Plan shall include the following:

  • Electronic Notices If you have agreed to receive notices electronically, we may send you notices electronically and discontinue mailing paper notices to you until you notify us that you wish to reinstate receiving paper notices.

  • Electronic Notice An electronic communication (“Electronic Notice”) shall be deemed written notice for purposes of this Section 16 if sent to the electronic mail address specified by the receiving party under separate cover. Electronic Notice shall be deemed received at the time the party sending Electronic Notice receives verification of receipt by the receiving party. Any party receiving Electronic Notice may request and shall be entitled to receive the notice on paper, in a nonelectronic form (“Nonelectronic Notice”) which shall be sent to the requesting party within ten (10) days of receipt of the written request for Nonelectronic Notice.

  • Electronic Execution of Documents The words “execution,” “signed,” “signature” and words of like import in any Loan Document shall be deemed to include electronic signatures or the keeping of records in electronic form, each of which shall be of the same legal effect, validity and enforceability as a manually executed signature or the use of a paper-based recordkeeping systems, as the case may be, to the extent and as provided for in any applicable law, including, without limitation, any state law based on the Uniform Electronic Transactions Act.

Time is Money Join Law Insider Premium to draft better contracts faster.