Server Access Sample Clauses

POPULAR SAMPLE Copied 7 times
Server Access. Access to servers is only possible directly for a very small group of employees. PKI-based access meth- ods (SSH) with a minimum key length of 4096 bits are used here. In addition, access via firewall is reserved for certain IP addresses only. • Server Location and On-site Security Measures All our servers are located in data centers in Germany. Our data center partners are DIN ISO/IEC 27001 certified. This includes access to the hardware, emergency power supply, access to the data center and operation of the infrastructure.
Server Access. Vendor shall provide you reasonable access via internet connectivity to an Authorized Server. Vendor reserves the right to change the identity, equipment and/or configuration of the Authorized Server at any time. You shall provide and maintain an ISP account with a PPTP internet connection for communicating with the Authorized Server. Vendor will provide You all necessary information to access the Software Service on an Authorized Server via the Client Software, including internet address and/or portal information, username and password information which shall be considered confidential information and treated as such by You to the extent permitted by Minnesota law.
Server Access. 2.5.1 VPN and remote access 2.5.2 Physical access to virtual servers
Server Access. If the online version of IBIS RMO is hosted on the Licensee’s server, Licensee agrees to give Licensor log-in rights to a web page in IBIS RMO on Licensee’s server that shows the number of proposal packages, application packages, and closing packages that are created by IBIS RMO for the Licensee. In addition, if IBIS RMO is hosted on Licensee’s server, Licensee further either (1) shall give Licensor remote access to
Server Access. Access to the [xxxx] service for the purposes of maintenance by [Customer] will be available using [xxxx] State how accounts are set up and maintained State how any customer change controls can be managed and recorded. Comment on whether any additional monitoring will be provided.
Server Access. ▇▇.▇. ▇▇▇ cannot, and may not, physically access any server we use to provide the hosting service, nor visit or access the data centre.
Server Access. For security reasons, shared servers are not accessible with remote access software. Please note that many tasks on shared servers can also be performed using the MyAccount website. 2.5.11 Physical access to Hostbasket shared servers
Server Access. Should the Contractor require the use of Government-furnished server access; the Contractor shall maintain its applications, and firmware to include latest patches and updates, register all assigned servers and maintain appropriate certifications at all times in accordance with OTC security regulations. All IT equipment and programs shall comply with Government security requirements including RMF and Army Golden Master compliance. This includes verification and validation of STIGs associated with each Government furnished server and Contractor application. These applications shall be existing baseline applications approved by the Government prior to use. The Contractor shall provide updated master copies of all contractor software applications using a Government server.
Server Access. For security reasons, shared servers are not accessible with remote access software. Please note that many tasks on shared servers can also be performed using the MyAccount website. 2.5.1 Physical access to Ziggo shared servers
Server Access. Vendor shall provide You reasonable access to an Authorised Server via internet connectivity. Vendor reserves the right to change the identity, equipment and/or configuration of the Authorised Server at any time. You shall provide and maintain an ISP account with a PPTP internet connection for communicating with the Authorised Server. Vendor will provide You all necessary information to access the Software Service on an Authorised Server via the Client Software, including internet address and/or portal information, username and password information which shall be considered confidential information and treated as such by You.