System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.
Single Point of Contact When a problem is experienced, regardless of the severity, the BellSouth Network Management Center (NMC) will observe traffic anomalies and begin monitoring the situation. Controls will be appropriately applied to insure the sanity of BellSouth's network; and, in the event that a switch or facility node is lost, the NMC will attempt to circumvent the failure using available reroutes. BellSouth's NMC will remain in control of the restoration efforts until the problem has been identified as being a long-term outage. At that time, the NMC will contact BellSouth's Emergency Control Center (ECC) and relinquish control of the recovery efforts. Even though the ECC may take charge of the situation, the NMC will continue to monitor the circumstances and restore traffic as soon as damaged network elements are revitalized. The telephone number for the BellSouth Network Management Center in Atlanta, as published in Telcordia’s National Network Management Directory, is 000-000-0000.
Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.