Common use of Remote Access Clause in Contracts

Remote Access. If Axon requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance, except as otherwise agreed by the parties and approved by the County’s Information Technology Director in writing, the below requirements must be met before Axon is granted remote access to County Systems: (A) Axon will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Information Technology Security Manager or the Assistant Information Technology Manager. (B) Axon will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon will not access County Systems via unauthorized methods. (C) Axon’s remote access to County Systems will only be requested and activated on as- needed basis and disabled when not in use. (D) Remote access is restricted only to County Systems necessary for Axon to provide Services to County pursuant to this Agreement. (E) Axon will allow only its Workforce approved in advance by County to access County Systems. Axon will promptly notify County whenever an individual member of Axon's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon will keep a log of access when its Workforce remotely accesses County Systems. Axon will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) If any member(s) of Axon’s Workforce is provided with remote access to County Systems, then Axon’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) Failure of Axon to comply with this Section may result in Axon and/or Axon’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for Axon, is under the direct control of Axon, whether or not they are paid by Axon and who have direct or incidental access to County Systems. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 2 contracts

Sources: Addendum to Agreement for Public Safety Video Surveillance Solutions, Addendum to Agreement for Public Safety Video Surveillance Solutions

Remote Access. If Axon Solid Border requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenancemaintenance of Solid Border’s Services, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology Director and Chief Information Officer in writing, the below requirements must be met before Axon Solid Border is granted remote access to County Systems: (A) Axon Solid Border will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Director of Information Technology Security Manager or the Assistant and Chief Information Technology ManagerOfficer. (B) Axon Solid Border will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon Solid Border will not access County Systems via unauthorized methods. (C) AxonSolid Border’s remote access to County Systems will only be requested and activated on as- as-needed basis and disabled when not in use. (D) Remote access is restricted only to County Systems necessary for Axon Solid Border to provide Services to County pursuant to this Agreement. (E) Axon Solid Border will allow only its Workforce approved in advance by County to access County Systems. Axon Solid Border will promptly notify County whenever an individual member of AxonSolid Border's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon Solid Border will keep a log of access when its Workforce remotely accesses County Systems. Axon Solid Border will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) If any member(s) of AxonSolid Border’s Workforce is provided with remote access to County Systems, then AxonSolid Border’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) Failure of Axon Solid Border to comply with this Section may result in Axon Solid Border and/or AxonSolid Border’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for AxonSolid Border, is under the direct control of AxonSolid Border, whether or not they are paid by Axon Solid Border and who have direct or incidental access to County Systems. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 2 contracts

Sources: Addendum to Solid Border, Inc.’s Agreement, Addendum to Solid Border, Inc.’s Agreement

Remote Access. If Axon Innovative requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenancemaintenance of the Services, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology Director and Chief Information Officer in writing, the below requirements must be met before Axon Innovative is granted remote access to County Systems: (A) Axon A. Innovative will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced advance in writing by the County’s Director of Information Technology Security Manager or the Assistant and Chief Information Technology ManagerOfficer. (B) Axon B. Innovative will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon Innovative will not access County Systems via unauthorized methods. (C) AxonC. Innovative’s remote access to County Systems will only be requested and activated on as- as-needed basis and disabled when not in use. (D) D. Remote access is restricted only to County Systems necessary for Axon Innovative to provide Services to County pursuant to this Agreement. (E) Axon E. Innovative will allow only its Workforce approved in advance by County to access County Systems. Axon Innovative will promptly notify County whenever an individual member of AxonInnovative's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon Innovative will keep a log of access when its Workforce remotely accesses County Systems. Axon Innovative will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) F. If any member(s) of AxonInnovative’s Workforce is provided with remote access to County Systems, then AxonInnovative’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) G. Failure of Axon Innovative to comply with this Section may result in Axon Innovative and/or AxonInnovative’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) H. For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for AxonInnovative, is under the direct control of AxonInnovative, whether or not they are paid by Axon Innovative and who have direct or incidental access to County Systems. (I) I. For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 2 contracts

Sources: Renewal of Innovative Interface Agreement, Renewal of Innovative Interface Agreement

Remote Access. If Axon requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology Director and Chief Information Officer in writing, the below requirements must be met before Axon is granted remote access to County Systems: (A) Axon will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Director of Information Technology Security Manager or the Assistant and Chief Information Technology ManagerOfficer. (B) Axon will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon will not access County Systems via unauthorized methods. (C) Axon’s remote access to County Systems will only be requested and activated on as- needed basis and disabled when not in use. (D) Remote access is restricted only to County Systems necessary for Axon to provide Services to County pursuant to this Agreement. (E) Axon will allow only its Workforce approved in advance by County to access County Systems. Axon will promptly notify County whenever an individual member of Axon's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon will keep a log of access when its Workforce remotely accesses County Systems. Axon will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) If any member(s) of Axon’s Workforce is provided with remote access to County Systems, then Axon’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) Failure of Axon to comply with this Section may result in Axon and/or Axon’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for Axon, is under the direct control of Axon, whether or not they are paid by Axon and who have direct or incidental access to County Systems. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 2 contracts

Sources: Addendum to Agreement, Addendum to Agreement

Remote Access. If Axon Noble requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance, except as otherwise agreed by the parties and approved by the County’s Information Technology Director in writing, the below requirements must be met before Axon Noble is granted remote access to County Systems: (A) Axon ▇▇▇▇▇ will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Information Technology Security Manager or the Assistant Information Technology Manager. (B) Axon Noble will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon Noble will not access County Systems via unauthorized methods. (C) AxonNoble’s remote access to County Systems will only be requested and activated on as- needed basis and disabled when not in use. (D) Remote access is restricted only to County Systems necessary for Axon Noble to provide Services to County pursuant to this Agreement. (E) Axon Noble will allow only its Workforce approved in advance by County to access County Systems. Axon ▇▇▇▇▇ will promptly notify County whenever an individual member of Axon's ▇▇▇▇▇'▇ Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon Noble will keep a log of access when its Workforce remotely accesses County Systems. Axon Noble will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) If any member(s) of AxonNoble’s Workforce is provided with remote access to County Systems, then Axon’s ▇▇▇▇▇’▇ workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) Failure of Axon Noble to comply with this Section may result in Axon Noble and/or AxonNoble’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for AxonNoble, is under the direct control of AxonNoble, whether or not they are paid by Axon ▇▇▇▇▇ and who have direct or incidental access to County Systems. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s). THIS SOFTWARE LICENSE AGREEMENT (this "Agreement") is made and entered into and effective 10/1/2021 (the "Effective Date") by and between Noble Software Group, LLC, (hereinafter called "Noble"), and Fort Bend County a body corporate and politic under the laws of the State of Texas, located at ▇▇▇ ▇▇▇▇▇▇▇ ▇▇., Richmond, TX, 77469 (hereinafter called "Client").

Appears in 1 contract

Sources: Software Hosting Agreement

Remote Access. If Axon Solid Border requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance, except as otherwise agreed by the parties and approved by the County’s Information Technology Director in writing, the below requirements must be met before Axon Solid Border is granted remote access to County Systems: (A) Axon Solid Border will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Information Technology Security Manager or the Assistant Information Technology Manager. (B) Axon Solid Border will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon Solid Border will not access County Systems via unauthorized methods. (C) AxonSolid Border’s remote access to County Systems will only be requested and activated on as- as-needed basis and disabled when not in use. (D) Remote access is restricted only to County Systems necessary for Axon Solid Border to provide Services to County pursuant to this Agreement. (E) Axon Solid Border will allow only its Workforce approved in advance by County to access County Systems. Axon Solid Border will promptly notify County whenever an individual member of AxonSolid Border's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon Solid Border will keep a log of access when its Workforce remotely accesses County Systems. Axon Solid Border will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) If any member(s) of AxonSolid Border’s Workforce is provided with remote access to County Systems, then AxonSolid Border’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) Failure of Axon Solid Border to comply with this Section may result in Axon Solid Border and/or AxonSolid Border’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for AxonSolid Border, is under the direct control of AxonSolid Border, whether or not they are paid by Axon Solid Border and who have direct or incidental access to County Systems. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Sources: Addendum to Solid Border, Inc.’s Agreement

Remote Access. If Axon Noble requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance, except as otherwise agreed by the parties and approved by the County’s Information Technology Director in writing, the below requirements must be met before Axon Noble is granted remote access to County Systems: (A) Axon ▇▇▇▇▇ will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Information Technology Security Manager or the Assistant Information Technology Manager. (B) Axon Noble will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon Noble will not access County Systems via unauthorized methods. (C) AxonNoble’s remote access to County Systems will only be requested and activated on as- needed basis and disabled when not in use. (D) Remote access is restricted only to County Systems necessary for Axon Noble to provide Services to County pursuant to this Agreement. (E) Axon Noble will allow only its Workforce approved in advance by County to access County Systems. Axon ▇▇▇▇▇ will promptly notify County whenever an individual member of Axon's ▇▇▇▇▇'▇ Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon Noble will keep a log of access when its Workforce remotely accesses County Systems. Axon Noble will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) If any member(s) of AxonNoble’s Workforce is provided with remote access to County Systems, then Axon’s ▇▇▇▇▇’▇ workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) Failure of Axon Noble to comply with this Section may result in Axon Noble and/or AxonNoble’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for AxonNoble, is under the direct control of AxonNoble, whether or not they are paid by Axon ▇▇▇▇▇ and who have direct or incidental access to County Systems. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Sources: Software Hosting Agreement

Remote Access. If Axon As applicable, if CobbFendley requires remote access to County Systems for support, installation, integrations, configurations, maintenance, and/or maintenanceprovision of services, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology Director and Chief Information Officer in writing, the below requirements must be met before Axon CobbFendley is granted remote access to County Systems: (A) Axon a. CobbFendley will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Director of Information Technology Security Manager or the Assistant and Chief Information Technology ManagerOfficer. (B) Axon b. CobbFendley will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon CobbFendley will not access County Systems via unauthorized methods. (C) Axonc. CobbFendley’s remote access to County Systems will only be requested and activated on as- as-needed basis and disabled when not in use. (D) d. Remote access is restricted only to County Systems necessary for Axon CobbFendley to provide Services product and/or services to County pursuant to this Agreement. (E) Axon e. CobbFendley will allow only its Workforce approved in advance by County to access County Systems. Axon CobbFendley will promptly notify County whenever an individual member of AxonCobbFendley's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon CobbFendley will keep a log of access when its Workforce remotely accesses County Systems. Axon CobbFendley will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) f. If any member(s) of AxonCobbFendley’s Workforce is provided with remote access to County Systems, then AxonCobbFendley’s workforce Workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) g. Failure of Axon CobbFendley to comply with this Section may result in Axon CobbFendley and/or AxonCobbFendley’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) h. For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for Axon▇▇▇▇▇▇▇▇▇▇▇, is under the direct control of AxonCobbFendley, whether or not they are paid by Axon ▇▇▇▇▇▇▇▇▇▇▇ and who have direct or incidental access to County Systems. (I) i. For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Sources: Amendment to Cobb, Fendley & Associates, Inc.’s Agreement

Remote Access. If Axon requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology Director and Chief Information Officer in writing, the below requirements must be met before Axon is granted remote access to County Systems: (A) Axon will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Director of Information Technology Security Manager or the Assistant and Chief Information Technology ManagerOfficer. (B) Axon will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon will not access County Systems via unauthorized methods. (C) Axon’s remote access to County Systems will only be requested and activated on as- needed basis and disabled when not in use. (D) Remote access is restricted only to County Systems necessary for Axon to provide Services to County pursuant to this Agreement. (E) Axon will allow only its Workforce approved in advance by County to access County Systems. Axon will promptly notify County whenever an individual member of Axon's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon will keep a log of access when its Workforce remotely accesses County Systems. Axon will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) If any member(s) of Axon’s Workforce is provided with remote access to County Systems, then Axon’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) Failure of Axon to comply with this Section may result in Axon and/or Axon’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for Axon, is under the direct control of Axon, whether or not they are paid by Axon ▇▇▇▇ and who have direct or incidental access to County Systems. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Sources: Addendum to Agreement

Remote Access. If As applicable, if Axon requires remote access to County Systems for support, installation, integrations, configurations, and/or maintenance, except as otherwise agreed by the parties and approved by the County’s Director of Information Technology Director and Chief Information Officer in writing, the below requirements must be met before Axon is granted remote access to County Systems: (A) Axon will adhere to the restricted and monitored channels that are provided by the County, or other technologies approved in advanced in writing by the County’s Director of Information Technology Security Manager or the Assistant and Chief Information Technology ManagerOfficer. (B) Axon will neither implement nor deploy a remote access solution which bypasses and/or is designed to bypass County provided or approved controls. Axon will not access County Systems via unauthorized methods. (C) Axon’s remote access to County Systems will only be requested and activated on as- needed basis and disabled when not in use. (D) Remote access is restricted only to County Systems necessary for Axon to provide Services to County pursuant to this Agreement. (E) Axon will allow only its Workforce approved in advance by County to access County Systems. Axon will promptly notify County whenever an individual member of Axon's Workforce who has access to County Systems leaves its employ or no longer requires access to County Systems. Axon will keep a log of access when its Workforce remotely accesses County Systems. Axon will supply County with evidence of access logs concerning remote access to County Systems upon written request from County. Such access logs will be provided to County, within three business days from the date of County’s request. These requests may be used to confirm compliance with these terms and/or to investigate a security incident. (F) If any member(s) of Axon’s Workforce is provided with remote access to County Systems, then Axon’s workforce will not remotely log-in to County Systems from a public internet access device (e.g., airport computer terminal, or Internet café). This is due to the possibility of sensitive information being monitored by video or computer surveillance in public areas. (G) Failure of Axon to comply with this Section may result in Axon and/or Axon’s Workforce losing remote access to County Systems. County reserves the right at any time to disable remote access to protect County Systems. (H) For purposes of this Section, “Workforce” means employees, agents, subcontractors (where permitted), and/or other persons whose conduct, in the performance of work for Axon, is under the direct control of Axon, whether or not they are paid by Axon ▇▇▇▇ and who have direct or incidental access to County Systems. (I) For purposes of this Section, “Systems” means any: (i.) computer programs, including, but not limited to, software, firmware, application programs, operating systems, files and utilities; (ii.) supporting documentation for such computer programs, including, without limitation, input and output formats, program listings, narrative descriptions and operating instructions; (iii.) data and/or media; (iv.) equipment, hardware, servers, and/or devices; and/or (v.) network(s).

Appears in 1 contract

Sources: Addendum to Agreement for Interview Room Cameras and Related Equipment, Installation, and Software Services