Mobile Computing and Remote Working Sample Clauses

Mobile Computing and Remote Working. To protect Confidential Information residing on Supplier Information Processing Systems from the risks inherent in mobile computing and remote working, Supplier will:
AutoNDA by SimpleDocs
Mobile Computing and Remote Working. To protect Protected Information from the risks inherent in mobile computing and remote working, TrueCar will:
Mobile Computing and Remote Working. To protect ADT Data residing on Xxxxx.xxx Information Processing Systems from the risks inherent in mobile computing and remote working, Xxxxx.xxx will:

Related to Mobile Computing and Remote Working

  • Remote Access Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.

  • Anti-Layering The Company shall not incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is both (a) subordinate or junior in right of payment to any Senior Debt and (b) senior in any respect in right of payment to the Notes. No Subsidiary Guarantor shall incur, create, issue, assume, guarantee or otherwise become liable for any Indebtedness that is both (a) subordinate or junior in right of payment to its Senior Debt and (b) senior in right of the Section 4.9 hereof.

  • Scope of Cooperation 1. The Authorities recognise the importance of close communication concerning the Covered CCPs and intend to cooperate regarding:

  • Information Systems Acquisition Development and Maintenance Security of System Files. To protect City Information Processing Systems and system files containing information, Service Provider will ensure that access to source code is restricted to authorized users whose specific job function necessitates such access.

  • IMPORTANT INFORMATION ABOUT PROCEDURES FOR OPENING A NEW ACCOUNT To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.

  • Additional Accounting Services Ultimus shall also perform the following additional accounting services for each Portfolio:

  • Measurement and Monitoring Tools Contractor shall implement measurement and monitoring tools and procedures reasonably designed to measure its performance of the Services and assess such performance against any applicable service levels. Contractor shall provide LAUSD with a monthly report of service level performance under any applicable Work Order. Upon LAUSD’s request, Contractor shall provide LAUSD with access to the measurement and monitoring tools described herein, and to any information that they generate.

Time is Money Join Law Insider Premium to draft better contracts faster.