Integrity 2.1 Transmission control ☒ VPN connections ☒ The use of private storage media is prohibited ☒ Special protection when physically transporting data media
Data Integrity Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data or Professional Services Data and protect it from disclosure, improper alteration, or destruction.
Fire Protection Contractor shall take adequate and reasonable precautions to protect the Work against damage by fire and smoke. For example, without limitation, Contractor shall do the following:
Analytics 1.1. IFS may track and analyze the usage of the IFS Offering for purposes of determining usage made of the IFS Offering, for the purposes of security, to assist customers, and for improving the Software and Services and the user experience in using such Software and Services. For example, IFS may use this information to help customers derive more value from the Software and Services, to understand and analyze trends, or to track which features are used most often in order to improve the Software and Services. IFS may share anonymous usage data with its service providers for the purpose of helping in such tracking, analysis and improvements. Additionally, IFS may share such anonymous usage data on an aggregate basis in the normal course of operating their business; for example, IFS may share information publicly to show trends about the general use of its software and services. TERMS - SERVICES
Cultural Resources If a cultural resource is discovered, the Purchaser shall immediately suspend all operations in the vicinity of the cultural resource and notify the Forest Officer. Operations may only resume if authorized by the Forest Officer. Cultural resources identified and protected elsewhere in this contract are exempted from this clause. Cultural resources, once discovered or identified, are not to be disturbed by the Purchaser, or his, her or its employees and/or sub- contractors.
Network Etiquette The user is expected to abide by the generally accepted rules of network etiquette. These include, but are not limited to, the following: