Management of Users Sample Clauses

Management of Users. Unless Users in your organisation are enrolled on a third party provider programme you will be responsible for the creation/amendment/deletion/suspension & management of the User accounts at your Organisation. If a leaving User chooses to transfer any data that they are managing to the Organisation Administrator – you will be bound by the XXXX as if that data was your own.
AutoNDA by SimpleDocs
Management of Users. You will be responsible for the addition of users to the Group and the management of user roles within the Group:
Management of Users. (a) A Requesting Agency Hub Access Participant must establish and maintain a User Registry. The User Registry must include such details as required by the Hub Controller from time to time.
Management of Users. The Vendor has authorization to add / modify / delete users that are necessary for the provision of the services covered by this document, based on the procedure summarized below: Bandera 140 – Tel.: (00 0) 000 0000 – Santiago – xxx.xxxxxxxxxxxxxxxxx.xx [FIPO translation from Spanish original] [Logo] Santander Santiago [Logo] Produban
Management of Users. 28.1. The Agency undertakes to establish and maintain a User Registry of Users in accordance with Schedule 7. Home Affairs or the Data Holding Agency in any IDSA the Agency has entered into may request a copy of this User Registry.

Related to Management of Users

  • MANAGEMENT OF EVALUATION OUTCOMES 11.1 The evaluation of the Employee’s performance will form the basis for rewarding outstanding performance or correcting unacceptable performance.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Management of Company 5.1.1 The Members, within the authority granted by the Act and the terms of this Agreement shall have the complete power and authority to manage and operate the Company and make all decisions affecting its business and affairs.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

  • Traffic Management The Customer will not utilize the Services in a manner which, in the view of the Centre Operator, significantly distorts traffic balance on the Centre Operator’s circuits which are shared with other users. If, in the reasonable view of the Centre Operator, the Customer’s traffic patterns cause or may cause such distortion, the Customer should have a dedicated circuit capability. If the Customer declines to do so then the Centre Operator may suspend the Services while the matter is being resolved. If there is no resolution within 5 business days then either party may terminate the Agreement.

  • Management of Change 40.1.1 The parties to this collective agreement accept that change in the health service is necessary in order to ensure the efficient and effective delivery of health services. They recognise a mutual interest in ensuring that health services are provided efficiently and effectively, and that each has a contribution to make in this regard.

  • Management and Control (a) Management and control of the business of the Fund shall be vested in the Board, which shall have the right, power, and authority, on behalf of the Fund and in its name, to exercise all rights, powers, and authority of managers under the Delaware Act and to do all things necessary and proper to carry out the objective and business of the Fund and their duties hereunder. No Manager shall have the authority individually to act on behalf of or to bind the Fund except within the scope of such Manager's authority as delegated by the Board. The parties hereto intend that, except to the extent otherwise expressly provided herein, (i) each Manager shall be vested with the same powers, authority, and responsibilities on behalf of the Fund as are customarily vested in each director of a Delaware corporation and (ii) each Independent Manager shall be vested with the same powers, authority and responsibilities on behalf of the Fund as are customarily vested in each director of a closed-end Management investment company registered under the 1940 Act that is organized as a Delaware corporation who is not an "interested person" of such company, as such term is defined by the 1940 Act. During any period in which the Fund shall have no Managers, CSFB Alternative Capital, as the initial Member, shall have the authority to manage the business and affairs of the Fund.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

Time is Money Join Law Insider Premium to draft better contracts faster.