Network Credentials Sample Clauses

The Network Credentials clause defines the rules and responsibilities regarding the provision, use, and protection of login information, passwords, or other access credentials for a network or system. Typically, this clause outlines who is authorized to receive such credentials, the security measures required to safeguard them, and the consequences of unauthorized sharing or misuse. Its core practical function is to ensure the security and integrity of networked systems by clearly allocating responsibility for credential management and reducing the risk of unauthorized access.
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
Network Credentials. Client will provide documentation of Network Credentials ▇▇▇▇▇’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable): o Domain Administrator / Domain Server o Local Server o Local Workstation / Thin Client Administration o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o AntiVirus Managed Console o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the start of the AmplifyIT Services implementation. Network Credentials include the following (if applicable):
Network Credentials. Client will provide documentation of network credentials ▇▇▇▇▇’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following: o Domain Administrator / Domain Server o Virtual Server—Vmware/VSphere o Azure/Azure AD o Firewall o Antivirus Managed Console Services required for the implementation beyond those described in this Threat Hunting Agreement, including any on-site work, ▇▇▇▇▇ Support Desk assistance, or other work is billed at ▇▇▇▇▇’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. Effective/version: March 12, 2021 (To Be Delivered) ▇▇▇▇▇’s Threat Hunting Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology environment through use of the Threat Hunting Tools described below. ▇▇▇▇▇ will use the CrowdStrike Falcon Software and Perch Software and Equipment stated in the SOP (“Threat Hunting Tools") to attempt to find evidence of the tactics, techniques, and procedures (TTP) commonly used by attackers to compromise information technology systems (“Threat Hunting” or “Services”). Following deployment of the Threat Hunting Tools as described below, ▇▇▇▇▇ will notify Client of its findings and make recommendations about those findings. This Assessment is not designed or intended to replace a forensics investigation but may assist you in providing information to assist in such an investigation . The CrowdStrike Falcon Software and Perch Software and Sensor are referred to herein as “Threat Hunting Tools.” Threat Hunting Tools will be deployed remotely through automated methods. Perch sensor deployment may require onsite access for installation. Threat Hunting Tools remain in place for the period of the Subscription stated in the SOP. For Clients without an active Marco Managed IT Agreement, ▇▇▇▇▇ will monitor the deployed Threat Hunting Tools for up to sixty (60) days and will notify Client of Marco findings during that period. See the Subscription terms for any additional services provided by CrowdStrike and/or Perch during the Subscription Term. If Client has an active Managed IT Agreement with ▇▇▇▇▇, ▇▇▇▇▇ alerts will follow ▇▇▇▇▇’s standard Service Level Targets and Priority Standards. ▇▇▇▇▇’s monitoring and notification Services will be performed during ▇▇▇▇▇’s regular business hours. Subscription Terms Client understands and agrees that its Subscription is governed by...
Network Credentials. Client will provide documention of Network Credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network Credentials include the following (if applicable):  Domain Administrator / Domain Server  Local Server  Local Workstation / Thin Client Administration  Virtual Server - VMware / VSphere  SAN Administrator  Firewall  Switch  Router – if client owned  Wireless Access Points  SQL Administrator  Email Administrator  AntiVirus Managed Console  Web Hosting or Web Filtering Appliance/Software  Email Filtering Appliance / Software  Universal Power Supply (UPS) / Battery Backup  Ilo/IMM – Management Login  Printers
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Managed IT Services implementation. Network credentials include the following (if applicable): o Domain Administrator / Domain Server o Public Domain Record Information o Local Server o Local Workstations / Thin Client Administration o Active Directory o Azure/Azure AD o O365 Credentials o SSL Certificates o Virtual Server - VMware / VSphere o SAN Administrator o Firewall o Switch o Router – if client owned o Wireless Access Points o SQL Administrator o Email Administrator o Antivirus Managed Console o Public DNS Portals o Portal Addresses o Web Hosting or Web Filtering Appliance/Software o Email Filtering Appliance / Software o Universal Power Supply (UPS) / Battery Backup o Ilo/IMM – Management Login o Printers Services required for the implementation beyond those described in this IdentifyIT Agreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. *This IdentifyIT Agreement is effective for services that begin on or after February 1, 2021. Any subsequent versions of this IdentifyIT Agreement will be made available at ▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇. (To Be Delivered) Marco’s IdentifyIT Assessment is designed to assist Client in identifying certain information security risks to Client’s information technology through quarterly assessments (“IdentifyIT Assessment”). The IdentifyIT Assessment includes Marco’s review of a limited set of risks in four areas to the extent described below and the provision of recommendations concerning those risks. Marco will gather information for the IdentifyIT Assessment as described in paragraphs 1 through 4, below, by conducting interviews with Client personnel and by deploying certain Software on Client’s Designated Equipment (as applicable). Client requests that Marco provide this Assessment and consents to the deployment of Software and Marco’s access to Client’s information technology and personnel, including Client Information and Access, needed to provide this Assessment. Marco will: 1. Conduct an email phishing campaign designed to identify the security awareness maturity of Client’s active directory users;
Network Credentials. The City will provide Contractor with Network Credentials consisting of user IDs and passwords unique to each individual requiring Network access on behalf of the Contractor. Access rights will automatically expire one (1) year from the date of this Agreement. If this access is being granted for purposes of completing services for the City pursuant to a separate contract, then, this Agreement will expire at the completion of the contracted services, or upon termination of the contracted services, whichever occurs first. Services are being provided in accordance with City Secretary Contract No. _ . Services are being provided in accordance with City of Fort Worth Purchase Order No. _ . Services are being provided in accordance with the Agreement to which this Access Agreement is attached. No services are being provided pursuant to this Agreement.
Network Credentials. Client will provide documentation of Network Credentials Marco’s Project Manager prior to the
Network Credentials. Client will provide documentation of network credentials Marco’s Project Manager prior to the start of the Implementation. Network credentials include the following: • ▇▇▇ Network Jacks with Internet Access • Outgoing Port 443 Services required for the implementation beyond those described in this CSAgreement, including any on-site work, Marco Support Desk assistance, or other work is billed at Marco’s prevailing rates unless the Parties have entered into a separate agreement for such work or assistance. version: July 13, 2021 (To Be Delivered) Marco’s PSaaS Agreement consists of the Equipment and Installation Services, Subscription for Access Right to the Cloud Platform Services and Support Services described below.

Related to Network Credentials

  • Credentials The names and credentials of the individuals who: (1) designed the statistical sampling procedures and the review methodology utilized for the Claims Review and (2) performed the Claims Review.

  • Hosting Services NCR Voyix shall furnish facilities, equipment, computer programs and services, as specified from time to time by NCR Voyix, that NCR Voyix deems necessary for operation and maintenance of the System (collectively, the “Hosting Services”).

  • Rosters 8.1 As far as practically possible, the Employer will draw up a roster 1 week in advance. Changes to rosters may occur with 24 hours notice or, subject to the availability of the Employee, with less notice if by mutual consent. 8.2 The Employer will ordinarily roster Employees in a manner that is both fair and equitable to ensure that, where applicable, the allocation of weekend and public holiday hours are equally divided between Employees on a rotating basis.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central ▇▇▇▇▇▇ Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Training a. The employer, in consultation with the local, shall be responsible for developing and implementing an ongoing harassment and sexual harassment awareness program for all employees. Where a program currently exists and meets the criteria listed in this agreement, such a program shall be deemed to satisfy the provisions of this article. This awareness program shall initially be for all employees and shall be scheduled at least once annually for all new employees to attend. b. The awareness program shall include but not be limited to: i. the definitions of harassment and sexual harassment as outlined in this Agreement; ii. understanding situations that are not harassment or sexual harassment, including the exercise of an employer's managerial and/or supervisory rights and responsibilities; iii. developing an awareness of behaviour that is illegal and/or inappropriate; iv. outlining strategies to prevent harassment and sexual harassment; v. a review of the resolution of harassment and sexual harassment as outlined in this Agreement; vi. understanding malicious complaints and the consequences of such; vii. outlining any Board policy for dealing with harassment and sexual harassment; viii. outlining laws dealing with harassment and sexual harassment which apply to employees in B.C.