Network Access Policy Sample Clauses

Network Access Policy. Internet and network access is currently provided to the Facility by the University. All rules and regulations issued from time to time and at any time by the University with respect to Internet and network access apply to Tenant's use thereof, including the University’s “Acceptable Use Policy”.
AutoNDA by SimpleDocs
Network Access Policy. In order to comply with Ohio law and to ensure the security and integrity of AGO network resources (e.g. routers, switches, servers, workstations, printers, etc.), the User shall:  Acknowledge he/she has been provided with and will comply with the provisions of this Policy;  Utilize the AGO’s network resources and any information/data provided therefrom for authorized use only;  Immediately notify the AGO of any proven or suspected unauthorized disclosure or exposure of any AGO data or of information or identity theft;  Immediately notify the AGO if a Security Event has occurred or if suspicion of a Security Event has been identified. A Security Event includes, but is not limited to: o Any abnormality in the environment that could lead to a compromise of the system integrity or result in disclosure of data, o Hack attempts, o Malware, o Changes in security infrastructure, o System failures, o Compromised user accounts, and o Lost/stolen laptop or media.  Promptly notify the AGO of the date of separation if User leaves the employer or if access to AGO networks, applications, systems, and/or AGO data is no longer required. Access to the AGO network may be rescinded for failure to provide such notice;  Take all reasonable precautions to prevent the dissemination of User’s credentials by any means, including, but not limited to, not sharing the User’s username and password, not writing down the username and password, etc.; Exhibit AGO Contract #:  Create a password in compliance with the AGO password criteria set forth below. The AGO reserves the right to change the password criteria from time to time. Compliance with the AGO password criteria will be enforced via automated password authentication or public/private keys with strong pass-phrases. The AGO password criteria are as follows: o Minimum 12 characters, o Must include 3 of the 4: a-z, A-Z, 0-9, and special characters, o Passwords will require being reset based on level of access at the AGO’s discretion, o Passwords must be kept securely by the account owner, and never be shared, o Passwords must not contain sequences 01, 123, abc, etc., o Passwords must not contain properly spelled dictionary words, and o Passwords must not be directly identifiable to the user (e.g. social security number, date of birth, spouse’s name, username, etc.). Password history will be retained for 24 changes to ensure unique passwords. Inactive accounts will be disabled at 90 days, and removed at 120 days. Users of acco...
Network Access Policy. If Applicable, as outlined in Section 3 herein, Internet and network access may be provided by service provider to the Facility by the University. All rules and regulations issued from time to time and at any time by the University with respect to internet and network access shall apply to Tenant’s use thereof. Landlord may, at its discretion, from time to time change the Provider and make changes to the System. As an integrated communications provider, Provider offers its subscribers the means to acquire and disseminate a wealth of public, private, commercial and non-commercial information. Provider, Landlord and Agent want Tenant to be informed of his/her rights and obligations -- and those of Provider, Landlord and Agent -- in connection with Tenant’s use of the System and the Internet. The following policy (“Policy”) is intended as a plain English guide to those rights and obligations.

Related to Network Access Policy

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • WORK ACCESS The Association shall provide a current, written list of its Association Representatives to all heads of departments, offices, or bureaus represented herein and the CAO. The Association shall be responsible for keeping the list current. An Association Representative shall have access to department, office, or bureau facilities where Unit members are employed during regular working hours to assist employees covered under this MOU in addressing grievances when such Association assistance is requested by a grievant(s) or to investigate matters arising out of the application of the provisions of this MOU. The Association Representative shall request authorization for such visits by contacting the designated Management representative of the head of the office, department, or bureau. In the event immediate access cannot be authorized, the designated Management representative shall inform the Association Representative as to the earliest time when access can be granted. This Article shall not be construed as a limitation on the power of the head of a department, office, or bureau to restrict access to areas designated for security or confidential purposes.

  • Local Control Center, Metering and Telemetry The NTO shall operate, pursuant to ISO Tariffs, ISO Procedures, Reliability Rules and all other applicable reliability rules, standards and criteria on a twenty-four (24) hour basis, a suitable local control center(s) with all equipment and facilities reasonably required for the ISO to exercise ISO Operational Control over NTO Transmission Facilities Under ISO Operational Control, and for the NTO to fulfill its responsibilities under this Agreement. Operation of the NYS Power System is a cooperative effort coordinated by the ISO control center in conjunction with local control centers and will require the exchange of all reasonably necessary information. The NTO shall provide the ISO with Supervisory Control and Data Acquisition (“SCADA”) information on facilities listed in Appendices A-1 and A-2 herein as well as on generation and merchant transmission resources interconnected to the NTO’s transmission facilities pursuant to the ISO OATT. The NTO shall provide metering data for its transmission facilities to the ISO, unless other parties are authorized by the appropriate regulatory authority to provide metering data. The NTO shall collect and submit to the ISO billing quality metering data and any other information for its transmission facilities required by the ISO for billing purposes. The NTO shall provide to the ISO the telemetry and other operating data from generation and merchant transmission resources interconnected to its transmission facilities that the ISO requires for the operation of the NYS Power System. The NTO will establish and maintain a strict code of conduct to prevent such information from reaching any unauthorized person or entity.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Directory Listings 15.1.1 CBT, as publisher of its White Pages, will include Primary Listings of CLEC’s resale directory customers in its White Pages, and shall cause its publisher to include primary listings of CLEC’s directory customers in its Publisher’s Yellow Pages Directories under the following terms and conditions:

  • DATA/ACCESS/CONFIDENTIALITY/ PRESERVATION 10.1 As used in this Agreement, the word “data” shall mean all information and things developed or obtained during the performance of, or acquired or developed by reason of, this Agreement, including, but not limited to, all studies, reports, files, formulae, surveys, maps, charts, sound recordings, video recordings, pictorial reproductions, drawings, analyses, graphic representations, computer programs, computer printouts, notes, letters, memoranda, papers, and documents, all whether finished or unfinished.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Customer Access The Customer is responsible for the access to the Cloud Services and is responsible for maintaining the confidentiality of its access methods such as usernames and passwords and agrees to notify the Supplier via the Cloud Services support channel if a password is compromised. The Customer is responsible for all activities that occur under its Account.

Time is Money Join Law Insider Premium to draft better contracts faster.