Usage Control Sample Clauses

Usage Control. A documented, role-based authorization concept must be provided for use of personal data which limits the use so that only authorized individuals can use the personal data necessary for their task (De Minimis Principal). The password rules for access control must also be followed for usage control. Administrative activities must be limited to a small group of administrators. Administrator activities must be monitored and logged to the extent that the effort involved is technically supportable.
AutoNDA by SimpleDocs
Usage Control. A documented, role-based authorization concept must be provided for use of personal data which limits the use so that only authorized individuals can use the personal data necessary for their task (De Minimis Principal). The password rules for access control must also be followed for usage control. Administrative activities must be limited to a small group of administrators. Administrator activities must be monitored and logged to the extent that the effort involved is technically supportable. The company has implemented the requirement as follows: Role-based authorization concept User-dependent authentication with username and password Logging of user usage Assignment of authorizations only after approval by the data owner Administrative users are kept to a minimum and documented
Usage Control. You will be responsible for your userscompliance with this Agreement, as well as the accuracy, quality and legality of Your Data and the means by which you acquire Your Data. You agree to use commercially reasonable efforts to prevent unauthorized access to or use of the Hosted Service or Software Product and to notify Agiloft promptly of any such unauthorized access or use. You agree to use the Hosted Service and Software Product only in accordance with this Agreement, the End User Order, the Documentation and applicable laws and government regulations. It is your responsibility to comply with any terms of service for Other Applications which you use in conjunction with the Hosted Service or Software Product.
Usage Control. You will be responsible for user compliance with this Agreement. You agree to use commercially reasonable efforts to prevent unauthorized access to or use of our API Service or Software Product, and to notify us promptly of any such unauthorized access or use. You agree to use our API Service and Software Product only in accordance with the Quote, the Documentation and applicable laws and government regulations. It is your responsibility to comply with any terms of service for Other Applications which you use in conjunction with our API Service or Software Product.
Usage Control. 8.1. Usage Control is a free service. Only usage of telephone calls, SMS messages, MMS messages and data is included in the usage. Various quarterly charges, fees, discounts and the like are not included in the Usage Control amount. You must specify the monthly maximum amount which your usage cannot exceed. If the maximum amount is exceeded, the telephone will automatically be barred within 24 hours for all outgoing calls, SMS messages, MMS messages etc. You will still be able to receive calls, SMS messages and MMS messages after your telephone has been barred. Free minutes and free SMS messages cannot be used when your telephone has been barred because you have exceeded the maximum amount of your usage control.
Usage Control. 9.1. We compare your monthly usage to your average usage during the most recent 12 months. If your usage more than doubles in a month, you will receive a letter with information on your increased usage within 3 weekdays. You may register for Usage Alarm by contacting Customer Service Business on +00 00 000 000.
Usage Control. Expect Me has the right to monitor and inspect the usage of the Services and the Platform by the Client. If such inspection shows that the Client has underpaid the amount of fees due to Expect Me, without prejudice to any other rights and remedies available to Expect Me, the Client shall promptly pay the amount of such underpayment to Expect Me together with any applicable late payment interest.
AutoNDA by SimpleDocs
Usage Control. You will be responsible for user compliance with this Agreement, as well as the accuracy, quality and legality of Your KnowledgeBase, including the means by which you acquire Your Data. You agree to use our Software Product only in accordance with the Quote, the Documentation and applicable laws and government regulations. It is your responsibility to comply with any terms of service for Other Applications that you use in conjunction with our Software Product.
Usage Control. Customer will be responsible for user compliance with this Agreement, as it applies to the accuracy, quality and legality of Customer’s KnowledgeBase, including the means by which Customer acquires Customer Data. Customer agrees to use commercially reasonable efforts to prevent unauthorized access to or use of Agiloft’s Hosted Service or Software Product, and to notify Agiloft promptly of any such unauthorized access or use. Customer agrees to use Agiloft’s Hosted Service and Software Product only in accordance with the Quote, the Documentation and applicable laws and government regulations. It is Customer’s responsibility to comply with any terms of service for Other Applications which Customer uses in conjunction with Agiloft’s Hosted Service or Software Product.

Related to Usage Control

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Site Control In the total loss of building use scenario, what likely exists will be a smoking pile of rubble. This rubble will contain many components that could be dangerous. It could also contain any personnel on the premises at the time of the disaster. For these reasons, the local fire marshal with the assistance of the police will control the site until the building is no longer a threat to surrounding properties and the companies have secured the site from the general public. During this time, the majority owner of the building should be arranging for a demolition contractor to mobilize to the site with the primary objective of reaching the cable entrance facility for a damage assessment. The results of this assessment would then dictate immediate plans for restoration, both short term and permanent. In a less catastrophic event, i.e., the building is still standing and the cable entrance facility is usable, the situation is more complex. The site will initially be controlled by local authorities until the threat to adjacent property has diminished. Once the site is returned to the control of the companies, the following events should occur. An initial assessment of the main building infrastructure systems (mechanical, electrical, fire and life safety, elevators, and others) will establish building needs. Once these needs are determined, the majority owner should lead the building restoration efforts. There may be situations where the site will not be totally restored within the confines of the building. The companies must individually determine their needs and jointly assess the cost of permanent restoration to determine the overall plan of action. Multiple restoration trailers from each company will result in the need for designated space and installation order. This layout and control is required to maximize the amount of restoration equipment that can be placed at the site, and the priority of placements. Care must be taken in this planning to ensure other restoration efforts have logistical access to the building. Major components of telephone and building equipment will need to be removed and replaced. A priority for this equipment must also be jointly established to facilitate overall site restoration. (Example: If the AC switchgear has sustained damage, this would be of the highest priority in order to regain power, lighting, and HVAC throughout the building.) If the site will not accommodate the required restoration equipment, the companies would then need to quickly arrange with local authorities for street closures, rights of way or other possible options available.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Traffic Control The Surveyor shall control traffic in and near surveying operations adequately to comply with provisions of the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI which can be found on the State’s internet site. In the event field crew personnel must divert traffic or close traveled lanes, a Traffic Control Plan based upon principles outlined in the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI shall be prepared by the Surveyor and approved by the State prior to commencement of field work. A copy of the approved plan shall be in the possession of field crew personnel on the job site at all times and shall be made available to the State’s personnel for inspection upon request.

Time is Money Join Law Insider Premium to draft better contracts faster.