Backup Tape Vaulting, Security Protection & Testing Sample Clauses

Backup Tape Vaulting, Security Protection & Testing. Contractor incorporates both electronic access controls and personal recognition for controlling access to its facilities. All facilities are required to maintain systems for employee and visitor identification. Contractor personnel are required to wear identification badges while on Contractor premises. Badges are color-coded to indicate access authorization levels. Unescorted access to our records centers is prohibited for all but Contractor employees. Contractor’s facilities are equipped with intrusion detection systems that are monitored by an Underwriter Laboratories-listed central station for after-hours control. Alarm technology includes passive infrared motion detectors, dual technology glass break detection, photo-beam detectors, sound-activated microphones and magnetic door contacts. Alarm systems are individually designed to accommodate any specific site requirements and needs. Education and awareness training tools are used to ensure that all Contractor employees are aware of the methodologies and critical need for controlling access to Contractor’s buildings.
AutoNDA by SimpleDocs
Backup Tape Vaulting, Security Protection & Testing. Iron Mountain incorporates both electronic access controls and personal recognition for controlling access to its facilities. All facilities are required to maintain systems for employee and visitor identification. Iron Mountain personnel are required to wear identification badges while on Iron Mountain premises. Badges are color-coded to indicate access authorization levels. Unescorted access to our records centers is prohibited for all but Iron Mountain employees. Our facilities are equipped with intrusion detection systems that are monitored by an Underwriter Laboratories-listed central station for after-hours control. Alarm technology includes passive infrared motion detectors, dual technology glass break detection, photo- beam detectors, sound-activated microphones and magnetic door contacts. Alarm systems are individually designed to accommodate any specific site requirements and needs. Education and awareness training tools are used to ensure that all employees are aware of the methodologies and critical need for controlling access to our buildings.

Related to Backup Tape Vaulting, Security Protection & Testing

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Business Continuity and Disaster Recovery Bank shall maintain and update from time to time business continuation and disaster recovery procedures with respect to its global custody business, which are designed, in the event of a significant business disruption affecting Bank, to be sufficient to enable Bank to resume and continue to perform its duties and obligations under this Agreement without undue delay or disruption. Bank shall test the operability of such procedures at least annually. Bank shall enter into and shall maintain in effect at all times during the term of this Agreement reasonable provision for (i) periodic back-up of the computer files and data with respect to Customer and (ii) use of alternative electronic data processing equipment to provide services under this Agreement. Upon reasonable request, Bank shall discuss with Customer any business continuation and disaster recovery procedures of Bank. Bank represents that its business continuation and disaster recovery procedures are appropriate for its business as a global custodian to investment companies registered under the 1940 Act.

Time is Money Join Law Insider Premium to draft better contracts faster.