Common use of General OSS Policies Clause in Contracts

General OSS Policies. (1) Due to enhancements and on-going development of access to ASI-North’s OSS functions, certain interfaces described in this Agreement may be modified, temporarily unavailable or may be phased out after execution of this Agreement. (2) Each Party’s resources are for approved business purposes only. (3) Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its own systems, and take appropriate action should unauthorized or improper usage be discovered. (4) Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. (5) Authorized users must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. (6) Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 1 contract

Sources: Interconnection Agreement

General OSS Policies. (1) Due to enhancements and on-going development of access to ASISBC-North’s ASI/8- State's OSS functions, certain interfaces described in this Agreement may be modified, temporarily unavailable or may be phased out after execution of this Agreement. (2) Each Party’s 's resources are for approved business purposes only. (3) Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its own systems, and take appropriate action should unauthorized or improper usage be discovered. (4) Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. (5) Authorized users must not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. (6) Actual or suspected unauthorized access events must be reported immediately to each Party’s 's security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

Appears in 1 contract

Sources: Interconnection Agreement