Computer Network Security Sample Clauses

Computer Network Security. NetWitness shall use commercially reasonable efforts to carry out the following procedures to protect Customer’s Content:
AutoNDA by SimpleDocs
Computer Network Security. The purpose of Computer/Network security is to ------------------------- impede potential information flow between the InterTrust Technology Group and the Active Key Group by limiting access to electronic information. The Computer/Network Security procedures shall comprise, at a minimum, the following: (a) no portable storage media (such as floppy disks, Mo, etc.) shall be passed between members of the InterTrust and Active Key groups whether or not such media is thought to contain confidential information of either group; (b) no member of the Active Key Group, or any MBC or third party technical personnel, shall have access to the InterTrust Technology Group=s network resources, including file storage, printing, communications, and other host or server resources; (c) any server resources of the InterTrust Technology Group must be protected against unauthorized access, at a minimum through the use of individual user passwords; and (d) no InterTrust Top Secret Information shall be stored on a server (unless such server is used solely in connection with the InterTrust Technologies Group), or other storage media shared by persons not in the InterTrust Technology Group, and no such InterTrust Top Secret Information shall be included in any e-mail and other electronic communications between members of the InterTrust Technology Group passing through any host or server to which any member of the Active Key Group has any access rights. With respect to Chinese Wall Information other than Top Secret Information, all e-mail and other electronic communication between members of the InterTrust Technology Group containing any such information shall not pass through any host or server to which any member of the defined Key Group has any access rights which enables users to access information as an administrator.
Computer Network Security. RSA shall use commercially reasonable efforts to carry out the following procedures to protect Customer Content:
Computer Network Security. The purpose of Computer/Network security is to ------------------------- impede potential information flow between the InterTrust Technology Group and the Active Key Group by limiting access to electronic information. The Computer/Network Security procedures shall comprise, at a minimum, the following:
Computer Network Security. The Insurer shall pay on behalf of the Insured all sums in excess of the deductible that the Insured becomes legally obligated to pay as Damages as a result of a Claim first made against the Insured and reported in writing to the Insurer during the Policy Period or within sixty (60) days thereafter, by reason of any Wrongful Act arising out of Professional Services rendered or that should have been rendered by the Insured, provided that such Wrongful Act occurs on or after the Retroactive Date and before the end of the Policy Period and that results in: 1. the inability of a third party, who is authorized to do so, to gain access to Computer Systems; 2. the failure to prevent Unauthorized Access to Computer Systems that results in: a. the destruction, deletion, or corruption of electronic data on Computer Systems; b. Theft Of Data from Computer Systems; or c. denial of service attacks against Internet sites or computers; or 3. the failure to prevent transmission of Malicious Code from Computer Systems to third party computers and systems. However, notwithstanding any other provisions above, coverage hereunder excludes first party claims made by the Insured.
Computer Network Security 

Related to Computer Network Security

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Network Services Preventive care: 100% coverage. Preventive services include, but are not restricted to routine physical exams, routine gynecological exams, routine hearing exams, routine eye exams, and immunizations. A $100 single and $200 family combined annual deductible will apply to lab/diagnostic testing after which 100% coverage will apply. A $50 copay will apply to CT and MRI scans.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!