Customer Security Contacts Sample Clauses

Customer Security Contacts. Customer will identify a primary security contact and between 1 and 3 secondary security contacts in each SRF. Customer will ensure that all primary and secondary contacts are available and can be contacted by Orange 24 hours a day, 7 days a week. All Incidents will be reported to the listed contacts, and Orange will respond only to Service requests and calls regarding Incidents issued by such contacts. For Severity Level 1 and Severity Level 2 Incidents, Orange will notify Customer’s security contacts of the Incident using all contact details provided in the SRF. For Severity Level 3 Incidents, Orange will send a message to the email addresses set forth in the SRF. All contacts by Orange will be made in English, unless otherwise agreed to by the Parties. The primary security contact identified in the SRF will ensure that:  All security contact information is maintained and current;  Orange is notified before and after any planned outages or configuration changes to Customer's network or network services; and  All configuration changes are scheduled at least 5 Business Days in advance. All changes to Customer's primary security contact must be made in writing, on Xxxxxxxx's letterhead, and signed by a senior manager in Customer's organization.
AutoNDA by SimpleDocs
Customer Security Contacts. Customer will designate one primary and up to two additional Customer security contacts, and provide email and telephone contact details for each contact (the “Customer Security Contacts”). Customer will ensure Customer Security Contacts and all associated details are accurate and current at all times and that at least one Customer Security Contact is reachable 24/7. CenturyLink will only accept, discuss or make changes to the Service with the registered Customer Security Contacts or via the Portal. Requests for changes to the list of Customer Security Contacts must be made by an existing Customer Security Contact.

Related to Customer Security Contacts

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Customer Contacts CLEC, or CLEC's authorized agent, are the single point of contact for its End User Customers' service needs, including without limitation, sales, service design, order taking, Provisioning, change orders, training, maintenance, trouble reports, repair, post-sale servicing, Billing, collection and inquiry. CLEC will inform its End User Customers that they are End User Customers of CLEC. CLEC's End User Customers contacting Qwest will be instructed to contact CLEC, and Qwest's End User Customers contacting CLEC will be instructed to contact Qwest. In responding to calls, neither Party will make disparaging remarks about the other Party. To the extent the correct provider can be determined, misdirected calls received by either Party will be referred to the proper provider of Local Exchange Service; however, nothing in this Agreement shall be deemed to prohibit Qwest or CLEC from discussing its products and services with CLEC's or Qwest's End User Customers who call the other Party. 10.1 In the event Qwest terminates Service to CLEC for any reason, CLEC will provide any and all necessary notice to its End User Customers of the termination. In no case will Qwest be responsible for providing such notice to CLEC's End User Customers.

  • Customer Contact During the delivery phase of a Project Supplier may have direct communication with a Customer, limited solely to those communications necessary to affect provision of Services and/or Deliverables.

  • Mobile Banking Services Mobile Banking is a personal financial information management service that allows you to access account information and conduct transactions using compatible and supported mobile phones and/or other compatible and supported wireless devices (including phones, "Wireless Devices"). We reserve the right to modify the scope of the Mobile Banking services at any time. We reserve the right to refuse to make any transaction you request through Mobile Banking. You agree and understand that Mobile Banking may not be accessible or may have limited utility over some mobile telephone networks, such as while roaming.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Authorized Contacts LightEdge Solutions provides reliable and secure managed services by requiring technical support and information requests come only from documented, authorized client-organization contacts. Additionally, in compliance with federally regulated CPNI (Customer Proprietary Network Information) rules, a customer contacting LightEdge Solutions to request an add, move, or change and/or to request information on their account, must provide LightEdge representative with customer’s Code Word. Code Word is not required or verified to open trouble tickets related to service issues, however, any subsequent information/updates or authorization of intrusive testing related to the trouble ticket will require the Code Word. Customer shall provide a “contact list” which will contain one (“1”) Administrative contact and may contain up to three (“3”) Technical contacts per service. Administrative and Technical contacts are authorized to request service changes or information, including the contact name, contact e-mail address and contact phone number for each contact but must provide customer Code Word for any CPNI related requests. Requests to change a contact on the list or to change the Code Word must be submitted by the Administrative contact. Requests to replace the Administrative contact shall be submitted via fax to LightEdge on customer company letterhead. All requests are verified per procedure below.  Requests for CPNI, configuration information or changes are accepted only from documented, authorized client-organization contacts via e-mail, fax or phone and will require Customer’s Code Word. E-mail and fax requests must be submitted without the Code Word. Customer contact will be called to verify Code Word. E- mail requests that include the Code Word will be denied and the client Administrative Contact will be notified and required to change the Code Word.  E-mail and fax requests are verified with a phone call to the documented client contact. Phone call requests must be validated with an e-mail request from a documented client contact.

  • Primary Contacts The Parties will keep and maintain current at all times a primary point of contact for this contract. The primary contacts for this this Contract are as follows:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!