Customer Security Contact Sample Clauses

Customer Security Contact. In each SRF, Customer will identify a primary security contact, and this person will be designated as an Administrator. In addition, Customer will identify between 2 and 4 secondary security contacts, and these personnel will also be designated as Administrators and will belong to the Super User group. Customer will ensure that all Administrators (including those who are designated as primary and secondary security contacts) are available and can be contacted by Orange at all times. The Users will report all Incidents to the Administrators. The Administrators are responsible for calling the GCSC to report any Incidents. The GCSC will only respond to Incidents and service requests reported by an Administrator to the GCSC by telephone or via the Portal. All communications between the GCSC and the Administrators will be made in English, unless otherwise agreed in writing by both Parties. Customer will notify Orange of any changes to the primary security contact in writing, on Xxxxxxxx's letterhead, and such notification must be signed by a senior manager in Customer’s organization. The primary security contact will ensure that: (a) all security contact information contained in the SRF are up-to-date, and (b) Orange is notified before and after any planned outages or configuration changes to Customer's IT Infrastructure or network-related services.
AutoNDA by SimpleDocs
Customer Security Contact. Customer is responsible for ensuring Kong at all times has updated and accurate Customer contact information for the appropriate person for Kong to notify regarding data security issues relating to the Software, with each such Customer contact’s current information to be provided by Customer through Kong’s support portal or included in the Order Form, if applicable.

Related to Customer Security Contact

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Secondary Contact Name Please identify the individual who will be secondarily responsible for all TIPS matters and inquiries for the duration of the contract. Xxxxx Xxxxx Secondary Contact Title Secondary Contact Title VP Service Secondary Contact Email Please enter a valid email address that will definitely reach the Secondary Contact. xxxxxx@xxxxxxxxxxxxxxxxxxxx.xxx Secondary Contact Phone Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). Please provide the accurate and current phone number where the individual who will be secondarily responsible for all TIPS matters and inquiries for the duration of the contract can be reached directly. 0000000000 Secondary Contact Fax Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 0000000000 Secondary Contact Mobile Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 7 2812172425 Administration Fee Contact Name Please identify the individual who will be responsible for all payment, accounting, and other matters related to Vendor's TIPS Administration Fee due to TIPS for the duration of the contract. Xxxxx Xxxx Administration Fee Contact Email Please enter a valid email address that will definitely reach the Administration Fee Contact. 9 xxxxx@xxxxxxxxxxxxxxxxxxxx.xxx Administration Fee Contact Phone Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 2 0 7139802880

  • Customer Contact During the delivery phase of a Project Supplier may have direct communication with a Customer, limited solely to those communications necessary to affect provision of Services and/or Deliverables.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Mobile Banking Service Mobile Banking is offered as a convenience and supplemental service to our Online Banking services. It is not intended to replace access to Online Banking from your personal computer or other methods you use for managing your accounts and services with us. Mobile Banking allows you to access your Patriot account information, use bill pay, transfer funds between your accounts, deposit items remotely and conduct other banking transactions. We reserve the right to limit the types and number of accounts eligible and the right to refuse to make any transaction you request through Mobile Banking. We may also reserve the right to modify the scope of the Mobile Banking Service at any time. Mobile Banking may not be accessible over some network carriers. In addition, the Mobile Banking Service may not be supportable for all Devices. Patriot cannot guarantee, and is not responsible for, the availability of data services provided by your mobile carrier, such as (but not limited to) data outages or "out of range" issues. You agree to accept responsibility for learning how to use Mobile Banking in accordance with the instructions and agree that you will contact us directly if you have any problems with Mobile Banking. We may modify the Mobile Banking Service from time to time at our sole discretion. You are responsible for making sure you understand how to use Mobile Banking as modified. You also accept responsibility for making sure that you know how to properly use your Device and we will not be liable to you for any losses caused by your failure to properly use the Mobile Banking Service or your Device. You agree that, when you use Mobile Banking, you remain subject to the terms and conditions of your existing agreements with any unaffiliated service providers, including, but not limited to, your mobile service provider and that this Agreement does not amend or supersede any of those agreements. You understand that those agreements may include fees, limitations and restrictions which might impact your use of Mobile Banking (such as data usage or text messaging charges imposed on you by your mobile service provider for uses of or interaction with Mobile Banking), you agree to be solely responsible for all such fees, limitations, and restrictions. You agree that only your mobile service provider is responsible for its products and services. Accordingly, you agree to resolve any problems with your provider directly without involving us. Any deposit account, loan or other credit union product accessed through this Mobile Banking service is also subject to the Account Agreements and Disclosures provided at time of account opening. You should review the Account disclosures carefully, as they may include transaction limitations and fees which might apply to your use of Mobile Banking.

  • Charge Nurse A charge nurse is an experienced nurse who is assigned the responsibility for the nursing activity and patient care on a single nursing unit for one (1) or more shifts. Nurses assigned charge responsibilities will have these additional responsibilities considered in their direct patient care assignments.

  • Network Etiquette You are expected to abide by the generally accepted rules of network etiquette. These include but are not limited to the following:

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

Time is Money Join Law Insider Premium to draft better contracts faster.