Remote Access Security Sample Clauses

Remote Access Security. In order to enable code development, and Customer support and maintenance of the Software (if purchased by Customer pursuant to a separate support and maintenance agreement), Company requires remote access capability. Remote access is normally provided by installing PC- Anywhere, ControlIT, or other industry standard remote access software. It may also be provided through a Customer solution such as VPN access. Regardless of what method is used to provide remote access, or which party provides remote access software, it is Customer’s responsibility to ensure that the remote access method meets Customer’s security requirements. Company makes no representations or warranties to Customer regarding the remote access software’s ability to meet Customer’s security or privacy needs. Company also makes no recommendation for any specific package or approach with regard to security. Customer is solely responsible for ensuring a secure network environment.
Remote Access Security. In order to enable code development and support and maintenance of the software, Selectron may require remote access capability. Remote access is normally provided by installing PC-Anywhere, ControlIT, or other industry standard remote access software. It may also be provided through a Licensee solution such as VPN access. Regardless of what method is used to provide remote access, or which party provides remote access software, it is Licensee’s responsibility to ensure that the remote access method meets Licensee’s security requirements. Selectron makes no representations or warranties to Licensee regarding the remote access software’s ability to meet Licensee’s security or privacy needs. Selectron also makes no recommendation for any specific package or approach with regard to security. Licensee is solely responsible for ensuring a secure network environment.
Remote Access Security. All access to our Information Assets must be in accordance with our policies regarding system, access, and cryptographic security requirements. All network traffic may be monitored by us at any time and without Notice. USERS accessing Information Assets and not using COMPANY-owned equipment must use reasonably secured endpoints with industry-standard security technologies and protections applied, provided, and managed by the Supplier of the Work. Remote access using individually assigned accounts is non-delegable by USER to anyone else. USERS are prohibited from using remote access technologies not provided or approved by COMPANY to expose, proxy, or remotely control active connections to our Information Assets.

Related to Remote Access Security

  • Remote Access Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Password Security Any password we provide to you may be used only during the Term to access Seller Central (or other tools we provide) to use the Services, electronically accept Your Transactions, and review your completed Transactions. You are solely responsible for maintaining the security of your password. You may not disclose your password to any third party (other than third parties authorized by you to use your account or Seller Central in accordance with this Agreement) and are solely responsible for any use of or action taken under your password. If your password is compromised, you must immediately change your password.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who ▇▇▇ may contact if there are any data security concerns or questions.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.