VPN Client Access Sample Clauses

VPN Client Access. In the VPN Client Access method, a VPN Client (software) is installed on one or more specific devices at the Contractor site, with Remote Access to the County (via a County VPN concentrator) granted from those specific devices only. An Authentication Token (a physical device or software token that an authorized remote access user is given for user authentication purposes, such as a CryptoCard, RSA token, SecureAuth IdP, Arcot software token, or other such County approved one-time- password mechanism) will be issued to the Contractor in order to authenticate Contractor staff when accessing County IS via this method. The Contractor agrees to the following when issued an Authentication Token: a. Because the Authentication Token allows access to privileged or confidential information residing on the County’s IS, the Contractor agrees to treat the Authentication Token as it would a signature authorizing a financial commitment on the part of the Contractor. b. A hardware Authentication Token is a County-owned physical device, and will be labeled as such. The label must remain attached at all times. c. The Authentication Token is issued to an individual employee of the Contractor and may only be used by the designated individual.
VPN Client Access. Primary Backup N/A a. Because the Authentication Token allows access to privileged or confidential information residing on the County’s Designated Systems, the Contractor agrees to treat the Authentication Token as it would a signature authorizing a financial commitment on the part of the Contractor. b. A hardware Authentication Token is a County-owned physical device, and will be labeled as such. The label must remain attached at all times. c. The Authentication Token is issued to an individual employee of the Contractor and may only be used by the designated individual. d. The Authentication Token must be kept in the possession of the individual Contractor employee it was issued to or in a secured environment under the direct control of the Contractor, such as a locked office where public or other unauthorized access is not allowed. e. If the Contractor’s remote access equipment is moved to a non-secured site, such as a repair location, the Authentication Token will be kept under Contractor control. f. If the Authentication Token is misplaced, stolen, or damaged, the Contractor will notify the County TechLink Center by phone within 24 hours. g. Contractor agrees to use the Authentication Token as part of its normal business operations and for legitimate business purposes only. h. The Authentication Token will be issued to Contractor following execution of this Agreement. Hardware Authentication Tokens will be returned to the County’s Tech Link Center within five (5) business days following contract termination, or upon written request of the County for any reason. i. Contractor will notify the County’s the County TechLink Center within one working day of any change in personnel affecting use and possession of the Authentication Token. The County Service Desk contact information is (▇▇▇) ▇▇▇-▇▇▇▇ or ▇▇▇▇▇▇▇@▇▇▇.▇▇▇▇▇▇.▇▇▇. Contractor will obtain the Authentication Token from any employee who no longer has a legitimate need to possess the Authentication Token. The County will recoup the cost of any lost or non-returned hardware Authentication j. Contractor will not store account or password documentation or PINs with Authentication Tokens. k. Contractor will ensure all Contractor employees that are issued an Authentication Token will be made aware of and provided with a written copy of the requirements set forth in this Addendum.