Cloud Firewall Sample Clauses

Cloud Firewall a. This is a cloud based solution wherein, the Cloud Firewall is hosted at Etisalat facility without any deployment of firewall devices at the Customer premise. It also includes security subscriptions and one- time automated configuration and ongoing remote support. It offers remote management by the customer on Etisalat portal (https:// xxxxxxxxxxxxxx.xxxxxxxx.xx) or remotely by Etisalat call center.
AutoNDA by SimpleDocs
Cloud Firewall a. Etisalat shall not be held liable for the performance of the Cloud Firewall in any case, especially if:

Related to Cloud Firewall

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • WASHINGTON’S ELECTRONIC BUSINESS SOLUTION (WEBS). Contractor represents and warrants that it is registered in Washington’s Electronic Business Solution (WEBS), Washington’s contract registration system and that, all of its information therein is current and accurate and that throughout the term of this Master Contract, Contractor shall maintain an accurate profile in WEBS.

  • Telemetry The Meters shall be capable of sending meter telemetry data, and Seller shall provide Buyer with simultaneous access to such data at no additional cost to Buyer. This provision is in addition to Seller’s requirements under ISO-NE Rules and Practices, including ISO-NE Operating Procedure No. 18.

  • Moonlighting 24.01 The Company and the Union agree in principle to eliminate the practice commonly referred to as moonlighting.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Time is Money Join Law Insider Premium to draft better contracts faster.