Technology Standards Sample Clauses

Technology Standards. AVP shall use at least, and without limitation, the following security protection in connection with use, access, and display of Licensed Listings: Physical Security ▪The security perimeter is clearly defined and the facilities physically sound. ▪The walls are of solid construction. ▪External doors protect against unauthorized access. ▪Access rights to secure areas are regularly reviewed and updated. ▪Access rights to secure areas are changed when personnel changes. ▪Key storage is physically protected. ▪Media containing sensitive information is protected against unauthorized access. ▪Procedures are in place to handle secure disposal of backup media and other media containing sensitive information. Remote Access ▪Only users with a specific business requirement are granted remote access capabilities. ▪Users are authenticated prior to accessing corporate network resources. ▪Authentication is in the form of a unique username and password. ▪Secure encrypted communications are used for remote administration of production systems and applications. ▪Remote administration protocols, such as SSH, Telnet, PC Anywhere, Windows ▪Terminal Server, or Remote Desktop, limit access to only trusted networks using a firewall. Network Access ▪Access control devices such as a firewall are used to separate public, 3rd party, and corporate networks. ▪Users are located on separate network segments from those containing servers. ▪Users’ segments are separated from server segments by a firewall or equivalent access control device. ▪Network access policies disallow all access by default. ▪Access policies are audited to identify out dated policy rules. ▪Access control measures include username and password authentication. ▪User access is restricted on a need-to-know basis. ▪Maintenance accounts and remote support access are disabled if they are not required. ▪Privileged and administrative accounts are strictly controlled. ▪AVP default security settings are changed on production systems before the system goes into production. ▪Production systems are hardened by removing all unnecessary tools installed by the default configuration. ▪All production systems are updated with the latest security related patches released by the vendors of various components. ▪The router configuration is secured. ▪Egress and ingress filters are installed on all border routers to prevent impersonation with spoofed IP addresses. ▪If routers and other network devices are configured remotely, a secure communicat...
AutoNDA by SimpleDocs
Technology Standards a. Supplier will utilize AT&T’s approved Project Management methodologies, tools, and practices. Additional Amdocs procedures must be in compliance with AT&T’s current methodologies, tools, and practices for testing defect tracking systems and quality initiative approaches, and in compliance with or have an approved exception to the Technology, Strategies, and Standards (TSS) and such other processes as AT&T may implement in the future or as AT&T may require outside of the Technology Development organization; in each case to the extent the same have been communicated to Supplier by AT&T in writing. If AT&T implements new processes or changes in existing processes that result in a significant increase in the cost to Supplier of providing the Services, the Parties shall evaluate such changes and the associated cost using the then-applicable Change Management Process. Supplier will utilize AT&T processes for required deliverables to AT&T, but may follow Supplier methodology and best practices for internal testing activities.
Technology Standards. We will exercise reasonable efforts to maintain and upgrade all Internet and e-Commerce computer software and information technology, and other technological assets of the System, in a manner which keeps the System competitive. All decisions regarding technology improvements and upgrades will be made, in Our discretion, after consultation with the FOA. We will not implement “cutting edge” technology which does not have a reasonable cost versus benefit basis. When new technology is ready for use in the System, We will notify You.
Technology Standards. Parents and students should use the “Device Specifications” document to inform their choices when purchasing devices. These specifications ensure that the device will be able to connect to the school’s Wi-Fi network and that they will be of greatest advantage in meeting students’ educational needs. ✓ Security and Device Management: Devices will be locked in the students respective classroom through the day. ✓ Students using devices at Adamstown Public School should consider the following: ▪ Strong passwords ▪ Device anti-virus software ▪ Data and network traffic encryption ▪ Privacy controls ▪ Internet filtering ▪ Student Cyber Safety As a student, I understand and agree to abide by the conditions outlined above. I further understand that any violation of the above may lead to the loss of network privileges as well as other disciplinary action. Student Signature _ Date As a parent, I have read and discussed the above with my child and accept the terms of this agreement. I give permission for my child _ of class _ to bring the following device to school for the purpose of educational activities: Device Serial Number _ _ Parent Signature _ Date Please Print Name _ Draft written: 12th June 2016 ~ Revised: 12th August 2016 Revised: 6th June 2017, Revised 20th December 2018 0X Xxxxxx Xx Adamstown NSW 2289 Tel: 0000 0000 Email: xxxxxxxxx-x@xxx.xxx.xxx.xx Principal: Xxxx Xxxxxxxx Bring Your Own Device (BYOD) Student User Charter Students must read this agreement in the company of their parent/carer unless excused by the principal. This page is to be signed and returned to the school. By signing at the bottom of this page students agree to the following behaviours: ❒ I will only use Adamstown Public School’s Wi-Fi network for learning. ❒ I will use my laptop during school activities at the direction of the teacher. ❒ I will not attach any school-owned equipment to my mobile device without the permission of the school. ❒ I will only use my own portal/internet log-in details and will never share them with others. ❒ I will stay safe by keeping my personal information private. ❒ I will not hack or bypass any hardware and software security implemented by the department or my school. ❒ I will not use my own device to knowingly search for, link to, access or send anything that is: • offensive • obscene • threatening • abusive • defamatory • considered to be bullying ❒ I will report inappropriate behaviour and inappropriate material to my teacher. ❒ I understand that my...
Technology Standards. Vendor Licensee shall securely maintain at all times its computers and websites as secure sites, and the server on which any Licensed Listings or software for the Display Websites reside in a secure location, such that intruders may not access, damage, or alter files located on Vendor Licensee’s computers or access the Licensed Listings or software for the Display Websites. In addition, Vendor Licensee shall use reasonable security measures to prohibit screen scraping and data mining. Exhibit F Display Standards

Related to Technology Standards

  • Technical Standards The Generation System shall be installed and operated by the Interconnection Customer consistent with the requirements of this Agreement; the Technical Requirements; the applicable requirements located in the National Electrical Code (NEC); the applicable standards published by the American National Standards Institute (ANSI) and the Institute of Electrical and Electronic Engineers (IEEE); and local building and other applicable ordinances in effect at the time of the installation of the Generation System.

  • Safety Standards Performance of the Contract for all commodities or contractual services must comply with requirements of the Occupational Safety and Health Act and other applicable State of Florida and federal requirements.

  • ETHICAL STANDARDS a. Distributor and each of its sub-distributors will comply with the United States Foreign Corrupt Practices Act and without derogating from the generality of the foregoing, will not have its directors, officers or employees, directly or indirectly, offer, promise or pay any bribes or other improper payments for the purposes of promoting and/or selling Products to any individual, corporation, government official or agency or other entity. No gift, benefit or contribution in any way related to MEC or the promotion and/or sale of Products will be made to political or public officials or candidates for public office or to political organizations, regardless of whether such contributions are permitted by local laws.

  • Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.

Time is Money Join Law Insider Premium to draft better contracts faster.