SECURITY ACCESS POLICIES Sample Clauses

SECURITY ACCESS POLICIES. CTME shall provide the Customer access to the Co-location Space according to the policies outlined in the IDC Service Guide. The Customer and any Customer Authorised Representative must follow the Security Access Policies when accessing the Data Centre.
AutoNDA by SimpleDocs
SECURITY ACCESS POLICIES. CTMEA shall provide Customer access to the Co-location Space according to the policies outlined in the IDC Service Guide. Customer and any Customer Authorised Representative must follow the Security Access Policies when accessing the Data Centre.
SECURITY ACCESS POLICIES. 7.1. CTE shall provide Customer access to the Co-location Space according to the policies outlined in the IDC Service Guide. Customer and any Customer Authorised Representative must follow the Security Access Policies when accessing the Data Centre.
SECURITY ACCESS POLICIES. 7.1 CTKL shall provide Customer access to the Co-location Space according to the policies outlined in the IDC Service Guide. Customer and any Customer Authorised Representative must follow the Security Access Policies when accessing the Data Centre.

Related to SECURITY ACCESS POLICIES

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Fair Use Policy Betty Blocks has a fair use policy in relation to accessing and using the Services. For the purpose of this fair use policy, Client may not vary from the average in a disproportionate manner, having regard to the amount of CPU power, data storage and data traffic used by Client. In such event, Betty Blocks is entitled to temporarily limit or restrict access to the Services and/or require that Client to purchase additional Services, such as extra storage capacity.

  • Security Policy for Contractors 1. The Department for Work and Pensions treats its information as a valuable asset and considers that it is essential that information must be protected, together with the systems, equipment and processes which support its use. These information assets may include data, text, drawings, diagrams, images or sounds in electronic, magnetic, optical or tangible media, together with any Personal Data for which the Department for Work and Pensions is the Data Controller.

  • Schedule of Underlying Insurance Policies If Umbrella or Excess policy is evidenced to comply with minimum limits, a copy of the Underlying Schedule from the Umbrella or Excess insurance policy may be required.

  • Anti-­‐Abuse Policy i. Registry Operator’s Anti-­‐Abuse Policy will be required under the Registry Registrar Agreement and posted on the Registry Operator’s web site.

  • ADDITIONAL INSURED ENDORSEMENT AND PRIMARY AND NON-CONTRIBUTORY INSURANCE CLAUSE Supplier agrees to list Sourcewell and its Participating Entities, including their officers, agents, and employees, as an additional insured under the Supplier’s commercial general liability insurance policy with respect to liability arising out of activities, “operations,” or “work” performed by or on behalf of Supplier, and products and completed operations of Supplier. The policy provision(s) or endorsement(s) must further provide that coverage is primary and not excess over or contributory with any other valid, applicable, and collectible insurance or self-insurance in force for the additional insureds.

  • Additional Insurance Requirements The policies shall include, or be endorsed to include, the following provisions:

  • Claims Made Policy Requirements If General Liability, Pollution and/or Asbestos Pollution Liability and/or Errors & Omissions coverage are required and are provided on a claims-made form, the following requirements also apply:

Time is Money Join Law Insider Premium to draft better contracts faster.