What Is a Third Party Access Agreement

3.2 The Company will promptly notify Appalachian State University if an authorized employee of the Company leaves the workplace or no longer needs access to Appalachian State University`s network connection or equipment. The third-party access policy requires owners of natural monopolistic infrastructure to grant access to those resources on commercial terms comparable to those that would apply in a competitive market to parties other than their own customers, usually competitors in the provision of the services concerned. This Agreement constitutes the entire agreement between the parties with respect to the subject matter of this Agreement and supersedes all prior oral or written communications between the parties. There are no conditions, understandings, understandings, representations or warranties, express or implied, not specified herein. This Agreement may only be amended by a written document signed by the parties. Any dispute arising out of or relating to this Agreement shall be governed by the laws of North Carolina, without regard to choice of law provisions. IN WITNESS WHEREOF, the parties have made the necessary arrangements for the proper performance of this Agreement. Each party warrants and represents that its respective signatories, whose signatures appear below, were and are duly authorized to sign this Agreement at the time of signature. Third-party network connections established through VPN tunnels are authenticated using a third-party authentication database managed by Appalachian State University IT services. Third parties must comply with all applicable University rules, policies, and standards and agreements, including, but not limited to: 3.3 Each party is solely responsible for selecting, implementing, and maintaining sufficient security procedures and policies to ensure that (a) that party`s use of the network connection (and the Company`s use of Appalachian State University devices) is secure, and is used only for authorized purposes, and (b) this party`s business records and data are protected from improper access, use, alteration of loss or destruction. The purpose of this policy is to provide a set of measures that mitigate the information security risks associated with third party access and third party responsibilities, as well as the protection of St.

Mary`s University`s information. This policy also applies to all persons who are responsible for the installation of new academic information resources and allow third parties access for the purposes of maintenance, monitoring and troubleshooting of existing information systems. These limited third-party license agreements allow IQVIA customers to share IQVIA information with vendors for a predefined purpose and only for the benefit of the requesting IQVIA customer. 10.2 Waiver. The failure of either party to enforce any provision of this Agreement shall not be construed as a waiver of that party`s right to enforce those provisions thereafter. Appalachian State University`s Network Support Group, which is responsible for installing and configuring a particular third-party connection, must ensure that all possible steps have been taken to protect the integrity and confidentiality of Appalachian State University`s confidential information. At no time shall Appalachian State University rely on access control and authorization mechanisms at a third party location to protect or prohibit access to Appalachian State University`s confidential information. Third-party name management contact (name, phone number, email address)Location (address) of the network connection endpoint (including building number, floor, and room number)Primary phone numberLocal technical support times (7X24, etc.). Third-party host/domain namesNames (email addresses, phone numbers) of all third-party employees who will use this access. If it is not appropriate to list the names of all employees, specify the number of employees who will use the connection. St. Mary`s University provides the third party with a contact person for information services.

The contact person will work with the third party to ensure that they comply with these rules. F. Are there any known problems, special services. B that are needed? Are there any unknown issues at this time, e.B what internal appalachian state university services are needed? To initiate a third-party access request, customers can obtain a portal ID and password by contacting their IQVIA account manager. Once you have a login, go to the portal and follow the steps below: 8. Privacy. The parties acknowledge that due to their relationship with each other under this Agreement, each party has access to certain information and materials about the other party`s technology and products that are confidential and of significant value to that party, the value of which would be compromised if such information were disclosed to third parties (“Confidential Information”). If such confidential information is disclosed orally or visually, the disclosing party must combine the confidential information in writing within thirty (30) days of disclosure. Each party agrees not to use the confidential information disclosed to it by the other party in any way for its own account, except as provided herein, or to disclose it to any third party. Each party will take all reasonable precautions to protect the confidentiality of such confidential information. At the request of the receiving Party, the disclosing Party shall indicate whether or not it considers certain information or documents to be confidential.

The receiving party acknowledges that the unauthorized use or disclosure of it could cause irreparable harm to the disclosing party that could not be compensated by financial damages. Therefore, each party agrees that the other party has the right to seek an injunction and an interim measure to remedy any actual or threatened unauthorized use or disclosure of that other party`s confidential information. The obligation of confidentiality of the receiving party does not apply to information that: (a) is already known or publicly available to the receiving party at the time of disclosure; (b) disclosed to the receiving party by a third party that does not breach any obligation of confidentiality to the party to this Agreement claiming ownership of such information; or (c) becomes available to the public after the disclosure without fail by the receiving party. . . .

Comments are closed.