COMPUTER USAGE AND NETWORK ACCESS POLICY Sample Clauses

COMPUTER USAGE AND NETWORK ACCESS POLICY. In order to comply with Ohio law and to ensure the security and integrity of AGO network resources (e.g. routers, switches, servers, workstations, printers, etc.), the User shall: Acknowledge he/she has been provided with and will comply with the provisions of this Policy; Utilize the AGO’s network resources and any information/data provided therefrom for authorized use only; Use all computer resources, including, but not limited to, equipment, hardware, software, documentation, and data solely for AGO business; Immediately notify the AGO of any proven or suspected unauthorized disclosure or exposure of any AGO data or of information or identity theft; Immediately notify the AGO if a Security Event has occurred or if suspicion of a Security Event has been identified. A Security Event includes, but is not limited to: Any abnormality in the environment that could lead to a compromise of the system integrity or result in disclosure of data, Hack attempts, Malware, Changes in security infrastructure, System failures, Compromised user accounts, and Lost/stolen laptop or media. Promptly notify the AGO of the date of separation if User leaves the employer or if access to AGO networks, applications, systems, and/or AGO data is no longer required. Access to the AGO network may be rescinded for failure to provide such notice; Take all reasonable precautions to prevent the dissemination of User’s credentials by any means, including, but not limited to, not sharing the User’s username and password, not writing down the username and password, etc.;
AutoNDA by SimpleDocs
COMPUTER USAGE AND NETWORK ACCESS POLICY. In order to comply with Ohio law and to ensure the security and integrity of AGO network resources (e.g. routers, switches, servers, workstations, printers, etc.), the User shall:  Acknowledge he/she has been provided with and will comply with the provisions of this Policy;  Utilize the AGO’s network resources and any information/data provided therefrom for authorized use only;  Use all computer resources, including, but not limited to, equipment, hardware, software, documentation, and data solely for AGO business;  Immediately notify the AGO of any proven or suspected unauthorized disclosure or exposure of any AGO data or of information or identity theft;  Immediately notify the AGO if a Security Event has occurred or if suspicion of a Security Event has been identified. A Security Event includes, but is not limited to: o Any abnormality in the environment that could lead to a compromise of the system integrity or result in disclosure of data, o Hack attempts, o Malware, o Changes in security infrastructure, o System failures, o Compromised user accounts, and o Lost/stolen laptop or media.  Promptly notify the AGO of the date of separation if User leaves the employer or if access to AGO networks, applications, systems, and/or AGO data is no longer required. Access to the AGO network may be rescinded for failure to provide such notice;  Take all reasonable precautions to prevent the dissemination of User’s credentials by any means, including, but not limited to, not sharing the User’s username and password, not writing down the username and password, etc.;  Create a password in compliance with the AGO password criteria set forth below. The AGO reserves the right to change the password criteria from time to time. Compliance with the AGO password criteria will be enforced via automated password authentication or public/private keys with strong pass-phrases. The AGO password criteria are as follows: o Minimum 12 characters, o Must include 3 of the 4: a-z, A-Z, 0-9, and special characters, o Passwords will require being reset based on level of access at the AGO’s discretion, o Passwords must be kept securely by the account owner, and never be shared, o Passwords must not contain sequences 01, 123, abc, etc., o Passwords must not contain properly spelled dictionary words, and o Passwords must not be directly identifiable to the user (e.g. social security number, date of birth, spouse’s name, username, etc.). Password history will be retained for 24 chan...

Related to COMPUTER USAGE AND NETWORK ACCESS POLICY

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • NON-NETWORK PROVIDER is a provider that has not entered into a contract with us or any other Blue Cross and Blue Shield plan. For pediatric dental care services, non-network provider is a dentist that has not entered into a contract with us or does not participate in the Dental Coast to Coast Network. For pediatric vision hardware services, a non-network provider is a provider that has not entered into a contract with EyeMed, our vision care service manager.

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Conversion of Wholesale Services to Network Elements or Network Elements to Wholesale Services Upon request, BellSouth shall convert a wholesale service, or group of wholesale services, to the equivalent Network Element or Combination that is available to Global Dialtone pursuant to Section 251 of the Act and under this Agreement or convert a Network Element or Combination that is available to Global Dialtone pursuant to Section 251 of the Act and under this Agreement to an equivalent wholesale service or group of wholesale services offered by BellSouth (collectively “Conversion”). BellSouth shall charge the applicable nonrecurring switch-as-is rates for Conversions to specific Network Elements or Combinations found in Exhibit A. BellSouth shall also charge the same nonrecurring switch-as-is rates when converting from Network Elements or Combinations. Any rate change resulting from the Conversion will be effective as of the next billing cycle following BellSouth’s receipt of a complete and accurate Conversion request from Global Dialtone. A Conversion shall be considered termination for purposes of any volume and/or term commitments and/or grandfathered status between Global Dialtone and BellSouth. Any change from a wholesale service/group of wholesale services to a Network Element/Combination, or from a Network Element/Combination to a wholesale service/group of wholesale services, that requires a physical rearrangement will not be considered to be a Conversion for purposes of this Agreement. BellSouth will not require physical rearrangements if the Conversion can be completed through record changes only. Orders for Conversions will be handled in accordance with the guidelines set forth in the Ordering Guidelines and Processes and CLEC Information Packages as referenced in Sections 1.13.1 and 1.13.2 below.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Coverage and Application 1. This Agreement shall apply with respect to the avoidance or settlement of all disputes arising between the Parties under the covered agreements. Unless otherwise provided in this Agreement or any other covered agreement, this Agreement shall apply to all disputes between the Parties.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Local Control Center, Metering and Telemetry The NTO shall operate, pursuant to ISO Tariffs, ISO Procedures, Reliability Rules and all other applicable reliability rules, standards and criteria on a twenty-four (24) hour basis, a suitable local control center(s) with all equipment and facilities reasonably required for the ISO to exercise ISO Operational Control over NTO Transmission Facilities Under ISO Operational Control, and for the NTO to fulfill its responsibilities under this Agreement. Operation of the NYS Power System is a cooperative effort coordinated by the ISO control center in conjunction with local control centers and will require the exchange of all reasonably necessary information. The NTO shall provide the ISO with Supervisory Control and Data Acquisition (“SCADA”) information on facilities listed in Appendices A-1 and A-2 herein as well as on generation and merchant transmission resources interconnected to the NTO’s transmission facilities pursuant to the ISO OATT. The NTO shall provide metering data for its transmission facilities to the ISO, unless other parties are authorized by the appropriate regulatory authority to provide metering data. The NTO shall collect and submit to the ISO billing quality metering data and any other information for its transmission facilities required by the ISO for billing purposes. The NTO shall provide to the ISO the telemetry and other operating data from generation and merchant transmission resources interconnected to its transmission facilities that the ISO requires for the operation of the NYS Power System. The NTO will establish and maintain a strict code of conduct to prevent such information from reaching any unauthorized person or entity.

Time is Money Join Law Insider Premium to draft better contracts faster.