Remote Access Methods Clause Samples

Remote Access Methods. (a) All forms of Remote Access will be made in accordance with mutually agreed upon industry standard protocols and procedures, which must be approved in writing by the County. The remote access solution must conform to County policy and security requirements. (b) Remote Access Back-Up Method may be used in the event that the primary method of Remote Access is inoperable. (c) Contractor agrees to abide by the following provisions related to the Primary and (if applicable) Backup Remote Access Methods selected below. (Please mark appropriate box for each applicable Remote Access Method; if a method is not applicable, please check the button marked N/A). (i) VPN Site-to-Site Primary Backup N/A
Remote Access Methods. Contractor must obtain written permission from DoITT for each method of remote access it wishes to use to access City Information Assets.
Remote Access Methods a. All forms of Remote Access will be made in accordance with mutually agreed upon industry standard protocols and procedures, which must be approved in writing by the County. The remote access solution must conform to County policy and security requirements. b. Remote Access Back-Up Method may be used in the event that the primary method of Remote Access is inoperable. c. Contractor agrees to abide by the following provisions related to the Primary and (if applicable) Backup Remote Access Methods selected below. (Please mark appropriate box for each applicable Remote Access Method; if a method is not applicable, please check the button marked N/A). (i) VPN Site-to-Site Primary The VPN Site-to-Site method involves a VPN concentrator at both the Contractor site and at the County, with a secure “tunnel” opened between the two concentrators. If using the VPN Site-to-Site Method, Contractor support staff will have access to the Designated Systems from selected network-attached devices at the Contractor site.
Remote Access Methods. Users must use only remote access solutions approved and authorized by the appropriate Zone Owner and meeting the requirements set by the Employee Remote Access and Teleworking Policy.
Remote Access Methods. (a) All forms of Remote Access will be made in accordance with mutually agreed upon industry standard protocols and procedures, which must be approved in writing by the County. The remote access solution must conform to County policy and security requirements. (b) Remote Access Back-Up Method may be used in the event that the primary method of Remote Access is inoperable. (c) Contractor agrees to abide by the following provisions related to the Primary and (if applicable) Backup Remote Access Methods selected below. (Please mark appropriate box for each applicable Remote Access Method; if a method is not applicable, please check the box marked N/A). (i) VPN Site-to-Site  Primary  Backup  N/A The VPN Site-to-Site method involves a VPN concentrator at both the Contractor site and at the County, with a secure “tunnel” opened between the two concentrators. If using the VPN Site-to-Site Method, Contractor support staff will have access to the Designated Systems from selected network-attached devices at the Contractor site. (ii) VPN Client Access  Primary  Backup  N/A In the VPN Client Access method, a VPN Client (software) is installed on one or more specific devices at the Contractor site, with Remote Access to the County (via a County VPN concentrator) granted from those specific devices only. An Authentication Token (a physical device or software token that an authorized remote access user is given for user authentication purposes, such as a CryptoCard, RSA token, SecureAuth IdP, Arcot software token, or other such one-time-password mechanism approved by the County Information Security Office) will be issued to the Contractor in order to authenticate Contractor staff when accessing County Designated Systems via this method. The Contractor agrees to the following when issued an Authentication Token: a. Because the Authentication Token allows access to privileged or confidential information residing on the County’s Designated Systems, the Contractor agrees to treat the Authentication Token as it would a signature authorizing a financial commitment on the part of the Contractor. b. A hardware Authentication Token is a County-owned physical device, and will be labeled as such. The label must remain attached at all times. c. The Authentication Token is issued to an individual employee of the Contractor and may only be used by the designated individual. d. The Authentication Token must be kept in the possession of the individual Contractor employee it was is...
Remote Access Methods a. All forms of Remote Access will be made in accordance with mutually agreed upon industry standard protocols and procedures, which must be approved in writing by the County. b. A Remote Access Back-Up Method may be used in the event that the primary method of Remote Access is inoperable. c. Contractor agrees to abide by the following provisions related to the Primary and (if applicable) Backup Remote Access Methods selected below. (Please ▇▇▇▇ appropriate box for each applicable Remote Access Method; if a method is not applicable, please check the box marked N/A).
Remote Access Methods. Licensor must obtain written permission from DOHMH for each instance of remote access it wishes to use to access DOHMH Information Assets. For the avoidance of doubt, if Licensee authorized automatic updates, Licensor is still required to comply with this section (Remote Access Methods) to ensure the connection continues to be secure prior to each update.
Remote Access Methods. The Contractor must obtain written permission from DOHMH for each method of remote access it wishes to use to access DOHMH Technology Assets.
Remote Access Methods. Provider must disclose to NYC Health + Hospitals each method of remote access it wishes to use and access H+H Information Assets.
Remote Access Methods. Provider must obtain written permission from DOHMH for each instance of remote access it wishes to use and access DOHMH Information Assets.