Security Administration Clause Samples
Security Administration. When a Security Procedure is required to access a Service or authenticate instructions, you agree to appoint an Administrator with the authority to determine who will be authorized to use the Services on your behalf. You assume sole responsibility for the actions of your Administrator, the authority he or she gives others to act on your behalf, and the actions of the persons designated by the Administrator to use the Services. You or your Administrator will designate which accounts will be used for Service payments and transfers. If your Administrator designates an account that requires more than one signature for the withdrawal or transfer of funds, you agree that we may act upon any Service instruction that is accompanied by the password or Personal Identification Number designated by you or your Administrator for that account and the Service in question.
Security Administration. This Task Order involves no classified information.
Security Administration. Provide system software and hardware security controls. X X
Security Administration. 3.1 The Processor shall track, co-ordinate, implement, manage and maintain all security changes across the Services Environment.
3.2 The Processor shall limit the risk of unauthorised access to the Services Environment including content filtering to prevent objectionable material, virus protection, password controls and physical security. The Processor shall have regard to the confidentiality and sensitivity contained within the Services Environment and shall ensure that measures applicable to the UK health and social care sector are in place to prevent unauthorised access.
Security Administration. Subject to the Change Order Process, OneNeck shall generate and issue operating system User IDs, passwords, and access privileges for indicated individuals in accordance with Client-provided SOX controls upon request by authorized Client personnel or site administrator.
Security Administration. (a) Without limiting the authority of Agent hereafter to act or to appoint others to act as agent for itself and the Lenders under this Agreement and other Loan Documents, pursuant to subsection 10.2, Agent is authorized to assign and delegate to an agent (the “Collateral Agent”) some or all of Agent’s rights and duties in respect of Security, including without limitation, the administration of the Secured Borrowing Base as contemplated by Exhibit I, and Agent and the Lenders agree that Section 10 of this Agreement shall apply to any Collateral Agent in respect of the Security as if Section 10 were restated in full in favor of Agent and any Collateral Agent, as applicable. With the consent of the Lenders, Agent hereby appoints PNC Bank, National Association as a Collateral Agent, and PNC Bank, National Association hereby accepts such appointment. Additionally, PNC Bank, National Association is hereby appointed as Documentation Agent under this Agreement. Each Lender acknowledges that PNC Bank, National Association has been selected by Agent with reasonable care, that Agent shall not be responsible for negligence or misconduct thereof and that Agent shall be fully protected in relying thereon. Agent is authorized, directly or indirectly, to acquire, hold and enforce Liens on Security and to exercise related powers and perform such related duties in respect of Security, together with such other powers as are reasonably incidental thereto. Except to the extent expressly provided in this Agreement or any other Loan Document with respect to Security, neither Agent nor any of its agents in such capacity shall have any duties or responsibilities or any fiduciary relationship with any Lender, and no implied covenants, functions, responsibilities, duties, obligations or liabilities shall be read into this Agreement or any other Loan Document or otherwise exist against Agent or any of its agents.
(b) References to Agent in this Agreement and the other Loan Documents include, as applicable, references to agents of Agent, including any Collateral Agent, and references to Lenders entitled to the benefit of Security include, without limitation, Agent and its agents. Each Person acting as agent for Agent shall be (i) entitled to the same benefits of the indemnification, waiver and other protective provisions to which Agent is entitled under this Agreement (including, without limitation, the right to resign pursuant to subsection 10.10), (ii) entitled to take actions in i...
Security Administration. The security level for this project is UNCLASSIFIED.
Security Administration. ACT shall add and maintain any JCTO required security roles based on specifications supplied by JCTO for the ACT System. JCTO shall setup and maintain User IDs for the ACT System. JCTO, or ACT upon direction from JCTO, shall assign users to roles. JCTO shall assign Entitlements to users for the ACT System. As ACT enhances front-end security functionality to allow for JCTO personnel to assume more security related responsibilities, JCTO shall assume these responsibilities, with ACT training and / or assistance as needed.
Security Administration. The Supplier shall co-operate as necessary with the relevant 3rd party suppliers, to ensure that only individuals or entities with documented authorisation from the Authority are granted access rights to Systems provided by the Supplier or the Authority.
Security Administration. OptiMark will assist JOS ▇▇ determining the security levels and requirements for the New System, the Application, resources and user help desk functions, that may result from Application software enhancements, or changes in operating conditions or market conditions or rules. This may include changes to: - OS level file system security (read, write, execute, delete) - Layered Product (e.g. Safeguard) protection scheme for volumes, sub-volumes, and files - Data access requirements - Production ID and aliases to allow efficient data center operations, including audit trails - Escalation procedures for emergency access