Remote Access. Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.
Remote Access. The ISP will restrict remote access to BNY Mellon systems to authorized users using multifactor authentication or equivalent safeguard, and will require such access to be logged.
Remote Access. Users may access the licensed device from another device using remote access technologies, but only on devices separately licensed to run the same or higher edition of this software.
Remote Access. Customer must provide necessary remote access, required information, and support for the Covered System to connect to Philips Remote Service (PRS). PRS is the basis for Services delivered under this Exhibit. Customer waives all rights to services and service deliverables under this agreement unless PRS connectivity is enabled and maintained.
Remote Access. Vendor or an Associate, when providing services under the Assurance Plan, as part of Premium Technical Support or in connection with other services, may need to remotely connect to, and take control of, your equipment in order to resolve the issues that you are experiencing. In connection with this remote connection session:
(a) The Associate may need to run various scripts on your equipment, make changes to its configuration, install and uninstall software, and make other changes to the equipment and/or software settings of such equipment as may be necessary to address your issues. You understand that the Associate may, but is not obligated to, install and remove various proprietary or third party software tools where the Associate deems it necessary to assist you with the issues that you are experiencing. Elements of such software are protected by law, including copyright.
(b) You acknowledge and agree that, by authorizing the Associate to establish a remote connection session, you grant Vendor (and partners and contractors acting on Vendor’s behalf) full or limited access to your equipment, software and network (depending on your equipment, software and network configuration), and authorize Vendor to make such modifications as described above or as otherwise advised by the Associate during delivery of the Solution. You acknowledge and agree that the Associate, or you acting on the Associate’s direction may alter, delete or corrupt software or data on your equipment, change equipment, software or network settings, or otherwise interfere with the proper operation of your equipment, software or network.
(c) You acknowledge and agree that the Associate may have access to any information stored on your Device. Associates are trained not to access more information than necessary to resolve the issues for which you are requesting the Associate’s support. You must nevertheless remain in front of your Device screen to observe the actions of the Associate while he or she delivers the Solution on your Device. You will have the opportunity to end the live support session at any time by advising the Associate or disconnecting the remote connection session.
Remote Access. If Axon requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance, except as otherwise agreed by the parties and approved by the County’s Information Technology Director in writing, the below requirements must be met before Axon is granted remote access to County Systems:
(A) Axon will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Information Technology Security Manager or the Assistant Information Technology Manager.
(B) Axon will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon will not access County Systems via unauthorized methods.
(C) Axon’s remote access to County Systems will only be requested and activated on as- needed basis and disabled when not in use.
(D) Remote access is restricted only to County Systems necessary for Axon to provide Services to County pursuant to this Agreement.
(E) Axon will allow only its Workforce approved in advance by County to access County Systems. Axon will promptly notify County whenever an individual member of Axon's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon will keep a log of access when its Workforce remotely accesses County Systems. Axon will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident.
(F) If any member(s) of Axon’s Workforce is provided with remote access to County Systems, then Axon’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas.
(G) Failure of Axon to comply with this Section may result in Axon and/or Axon’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems.
(H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in...
Remote Access. As applicable, if Netsync requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance of Netsync’s Services, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology and Chief Information Officer in writing, the below requirements must be met before Netsync is granted remote access to County Systems:
(A) Netsync will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advance in writing by the County’s Director of Information Technology and Chief Information Officer.
(B) Netsync will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Netsync will not access County Systems via unauthorized methods.
(C) Netsync’s remote access to County Systems will only be requested and activated on as-needed basis and disabled when not in use.
(D) Remote access is restricted only to County Systems necessary for Netsync to conduct their services and/or provide Services to County pursuant to this Agreement. (E). Netsync will allow only its Workforce approved in advance by County to access County Systems. Netsync will promptly notify County whenever an individual member of Netsync's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Netsync will keep a log of access when its Workforce remotely accesses County Systems. Netsync will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident.
(F) If any member(s) of Netsync’s Workforce is provided with remote access to County Systems, then Netsync’s Workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas.
(G) Failure of Netsync to comply with this Section may result in Netsync and/or Netsync’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems.
(H) For purposes...
Remote Access. No more than once every 90 days, you may designate a single user who physically uses the licensed device as the licensed user. The licensed user may access the licensed device from another device using remote access technologies. Other users, at different times, may access the licensed device from another device using remote access technologies, but only on devices separately licensed to run the same or higher edition of this software.
Remote Access. For Philips to provide remote support, Customer must provide remote access to the Equipment via Philips specified connection as described in this Agreement and notify Philips of any changes to connection procedures. Customer must also provide Philips with access to domain accounts, passwords, and connections that are necessary to perform required Services.
Remote Access. The data flow in the remote connection must be encrypted and multi- factor authentication must be utilized during the login process.