DDoS Protection Sample Clauses

DDoS Protection. The Solution shall be able to protect against DDoS attacks by filtering out malicious traffic and redirecting legitimate traffic to the origin server.
AutoNDA by SimpleDocs
DDoS Protection. Azure has a defence system against Distributed Denial-of-Service (DDoS) attacks on Azure platform services. It uses standard detection and mitigation techniques. Azure’s DDoS defence system is designed to withstand attacks generated from outside and inside the platform.
DDoS Protection. Our DDoS Protection is provided ‘in-line’ on Our Network, meaning that all traffic passes through our scrubbing appliances prior to entering Our Network. While we use industry leading Corero Smartwall devices and have significant filtering headroom, our DDoS Protection is not limitless. Accordingly, you acknowledge and agree that:‌ (a) all DDoS Protection is offered ‘AS IS’ and is provided based only on the current DDoS scrubbing footprint within Our Network (typically between 20-80 Gbps per Point of Presence); (b) we cannot guarantee DDoS Protection against attacks that are either beyond the limits of our capacity (e.g., state level and/or large-scale DDoS attacks) or which are not actively filtered by our equipment (e.g., new, or complex Layer-7 attacks); (c) we do not provide discrete or specialised DDoS Protection to any IP Transit customers, and any DDoS Protection on these services will be simply the existing in-network protection; (d) notwithstanding Section 11.8(c), we may provide specialised DDoS products, however, these will be subject to their own specific agreements and SLAs, and any further protection afforded will be expressly set out therein; (e) we give no guarantees that our DDoS Protection will provide complete protection from attacks, be error-free or otherwise meet any specific outcome, goal, or expectation you may have; (f) all liability for DDoS Protection, DDoS attacks or related events is expressly excluded from this MSA and we will not be liable to you for any direct, indirect, incidental, punitive or special loss, Consequential Loss or exemplary damages and regardless of the form of action or claim (whether contract, tort, strict liability or otherwise), even if we have been informed of the possibility thereof; and (g) you will notify us in advance if enhanced DDoS protection is required, so that we may tailor a custom solution for you. Such solutions will incur additional cost and/or additional latency penalties and will be subject to a separate agreement.
DDoS Protection. The DDoS protection provided by SynthoHosting has been tested and has a nominal protection of up to 88 Tb/s. We guarantee protection up to 4 Tb/s.
DDoS Protection. 6.1. If ordered by you with your IEX Service in the Service Order, we must provide you with a DDoS Protection Service in accordance with this clause 6 (DDoS Protection Service). 6.2. The DDoS Protection Service provides protection against DDoS events that, in the sole opinion of us, require mitigation using traffic scrubbing, filtering, black holing or any other action in order to protect our Network and/or your network. The Service Order will stipulate whether you have procured one or both of the following components of the DDoS Protection Service: 6.3. DDoS Detect – which comprises of DDoS and traffic reporting, DDoS event alerts. 6.4. DDoS Protect – which comprises of the provision of on-net DDoS protection to automatically mitigate DDoS events detected by the 2degrees DDoS detection system at all times. 6.4.1. We may use BGP routing protocols or any other means to direct Customer bound traffic to 2degrees DDoS mitigation devices for the duration of the attack only. 6.4.2. You may also contact our support centre to request 2degrees DDoS Protect if an attack was not detected by 2degrees DDoS Detect. 6.4.3. We will in our sole discretion determine the method of mitigation to be used against a DDoS attack including, but not limited to, scrubbing, filtering and black holing of traffic. 6.4.4. Scrubbing of DDoS traffic as an action to mitigate a DDoS attack is limited to the current capacity of the on-net scrubbing system within our Network. 6.4.5. At any given time, the current capacity will depend on the source of the attack traffic, the ingress route and type of traffic destined for the host under attack, the volume of concurrent traffic being scrubbed and other factors. 6.4.6. Where a DDoS attack is larger than the scrubbing capacity of our mitigation system, we may black hole traffic or use other methods at our disposal to mitigate the attack. 6.5. If you have only procured DDoS Detect may request that we provide DDoS Protect for a period of up to 24 hours for an additional fee by contacting our support centre via telephone. At the end of the applicable 24 hour period, we will cease providing 2degrees DDoS Protect unless notified by you to continue for a further 24 hour period for an additional fee. 6.6. If you have not ordered a DDoS Protection Service, you may request, at no charge, mitigation of a DDoS attack in accordance with clause 6.5 once during the term of their IEXService, after which you must order a DDoS Protection Service. 6.7. The DDoS Pro...

Related to DDoS Protection

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position: (a) At the equivalent salary, grading; (b) At the equivalent weekly hours of duty; (c) In the same location or other location within reasonable commuting distance; and (d) Involving responsibilities broadly comparable to those experienced in the previous position. 15.9.2 Where applicable, employees shall continue to be awarded increments when their incremental date falls during absence on parental leave.

  • Eye Protection Where an employee is required by the College or by legislation, in order to perform his/her duties, to acquire and wear prescription eye protection, the employee shall provide the College with proof of purchase by March 1 each year and the College shall reimburse to such employee, on the first pay day of April in each year, up to a maximum of twenty dollars ($20.00); in situations other than the foregoing, the College, may in its discretion, (which discretion shall not be unreasonably exercised) reimburse such expense where it is recommended by the health and safety committee constituted under the Occupational Health and Safety Act.

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes: a. Systems containing DSHS Data must have all security patches or hotfixes applied within 3 months of being made available. b. The Contractor will have a method of ensuring that the requisite patches and hotfixes have been applied within the required timeframes. c. Systems containing DSHS Data shall have an Anti-Malware application, if available, installed. d. Anti-Malware software shall be kept up to date. The product, its anti-virus engine, and any malware database the system uses, will be no more than one update behind current.

  • Child Protection The Contractor acknowledges that it (and its personnel) are aware of the requirements of the Child Protection (Working with Children) Act 2012 (NSW) and all related laws concerning child protection (Child Protection Laws). The Contractor will ensure that it (and its personnel) comply with the requirements of the Child Protection Laws and policies of the DoE relating to child protection as notified to the Contractor from time to time. The Contractor must, at the Contractor’s expense, certify that the Contractor and the Contractor’s personnel are not a prohibited person under any Child Protection Laws and undergo any other screening, such as the ‘Working with Children Check’, as required under Child Protection Laws or by the School (or DoE). Any of the Contractor’s personnel that is a prohibited person under any Child Protection Laws must not be engaged in providing any Services. The Contractor is to immediately advise the Department if it becomes aware that it (or its personnel) are the subject of a reportable allegation involving children.

  • Whistle Blowing Protection The Employer agrees to adhere to the whistle blowing protection pursuant to the

  • TEACHER PROTECTION A. The teachers shall have the right to review those things in his/her personnel file to which he/she is entitled by Law. At the option of the teacher, a representative of the Association may be present for such review. Each file shall contain a record indicating reviewer and date of review, excluding school personnel official access for record maintenance. B. The teacher may submit a written notation regarding any material and the same will be attached to the file copy of the material in question. If the teacher is asked to sign material placed in his/her file, such signature will be understood to indicate his/her awareness of the material but in no instance shall said signature be interpreted to mean agreement with the content of the material. X. Any serious complaint made against a teacher by any parent, student, and other person will be promptly called to the attention of the teacher. D. If a teacher is to be disciplined or reprimanded by the Board or its designee, he/she shall be entitled to have a representative of the Association present. That representative shall be the teacher's choice between the building representative or another Association officer. E. Each teacher has the responsibility for maintaining proper student control and discipline throughout the school day as well as at school-sponsored activities where he/she is serving as a sponsor or chaperone. The teacher, however, has the primary responsibility for maintaining control and discipline in his/her classroom. The Board will give reasonable support and assistance to teachers with respect to maintenance of control and discipline. Whenever is appears that a particular pupil requires special attention, reasonable steps shall be taken to provide such attention. The teachers recognize that all disciplinary actions and methods invoked by them shall be in accordance with established Board policy. F. Any case of assault upon a teacher which is related to a school-centered problem shall be promptly reported to the Board or its designated representative. If the assault was by a pupil or pupils, the Administration shall promptly investigate the matter and determine suitable discipline for the assaulting pupil. This decision shall be communicated to the teacher concerned. If the assault is by an adult, who is not a pupil, the Board its designee representative shall promptly report the incident to the proper law enforcement authorities. G. A teacher may suspend a pupil from one (1) period, when the grossness of the offense, the persistence of the misbehavior, or the disruptive effect of the violation makes the continued presence of the student in that classroom intolerable. In such cases, the teacher will promptly (by the end of the school day) furnish the administrator or counselor full particulars of the incident. The teacher and the administration will cooperatively endeavor to achieve correction of student behavior through whatever avenues are reasonably available. H. School administrators and teachers will endeavor to achieve correction of the students' misbehavior through counseling and interviews with the child and his/her parents when warranted.

  • Whistleblower Protection Notwithstanding anything to the contrary contained herein, no provision of this Agreement shall be interpreted so as to impede the Employee (or any other individual) from reporting possible violations of federal law or regulation to any governmental agency or entity, including but not limited to the Department of Justice, the Securities and Exchange Commission, the Congress, and any agency Inspector General, or making other disclosures under the whistleblower provisions of federal law or regulation. The Employee does not need the prior authorization of the Company to make any such reports or disclosures and the Employee shall not be not required to notify the Company that such reports or disclosures have been made.

  • Whistleblower Protections The Party shall not discriminate or retaliate against one of its employees or agents for disclosing information concerning a violation of law, fraud, waste, abuse of authority or acts threatening health or safety, including but not limited to allegations concerning the False Claims Act. Further, the Party shall not require such employees or agents to forego monetary awards as a result of such disclosures, nor should they be required to report misconduct to the Party or its agents prior to reporting to any governmental entity and/or the public.

  • Data Protection Act 7.1 With respect to the parties' rights and obligations under this Contract, the parties agree that the Department is the Data Controller and that the Contractor is the Data Processor. 7.2 The Contractor shall: 7.2.1 Process the Personal Data only in accordance with instructions from the Department (which may be specific instructions or instructions of a general nature as set out in this Contract or as otherwise notified by the Department to the Contractor during the Term); 7.2.2 Process the Personal Data only to the extent, and in such manner, as is necessary for the provision of the Services or as is required by Law or any Regulatory Body; 7.2.3 The Contractor shall employ appropriate organisational, operational and technological processes and procedures to keep the Personal Data safe from unauthorised use or access, loss, destruction, theft or disclosure. The organisational, operational and technological processes and procedures adopted are required to comply with the requirements of ISO/IEC 27001 as appropriate to the services being provided to the Department; 7.2.4 Take reasonable steps to ensure the reliability of any Contractor Personnel who have access to the Personal Data; 7.2.5 Obtain prior written consent from the Department in order to transfer the Personal Data to any Sub-contractors or Affiliates for the provision of the Services; 7.2.6 Ensure that all Contractor Personnel required to access the Personal Data are informed of the confidential nature of the Personal Data and comply with the obligations set out in this clause 7; 7.2.7 Ensure that none of Contractor Personnel publish, disclose or divulge any of the Personal Data to any third party unless directed in writing to do so by the Department; 7.2.8 Notify the Department within five Working Days if it receives: a request from a Data Subject to have access to that person's Personal Data; or a complaint or request relating to the Department's obligations under the Data Protection Legislation; 7.2.9 Provide the Department with full cooperation and assistance in relation to any complaint or request made, including by: - providing the Department with full details of the complaint or request; - complying with a data access request within the relevant timescales set out in the Data Protection Legislation and in accordance with the Department's instructions; - providing the Department with any Personal Data it holds in relation to a Data Subject (within the timescales required by the Department); and - providing the Department with any information requested by the Department; 7.2.10 Permit the Department or the Department’s Representative (subject to reasonable and appropriate confidentiality undertakings), to inspect and audit the Contractor's data Processing activities (and/or those of its agents, subsidiaries and Sub-contractors) and comply with all reasonable requests or directions by the Department to enable the Department to verify and/or procure that the Contractor is in full compliance with its obligations under this Contract; 7.2.11 Provide a written description of the technical and organisational methods employed by the Contractor for processing Personal Data (within the timescales required by the Department) to be used solely for the purposes of this contract and provided that to do so would not be in breach of the Intellectual Property Rights (including Copyright) of a third party; and 7.2.12 Not process Personal Data outside the European Economic Area without the prior written consent of the Department and, where the Department consents to a transfer, to comply with: - the obligations of a Data Controller under the Eighth Data Protection Principle set out in Schedule 1 of the Data Protection Act 1998 by providing -an adequate level of protection to any Personal Data that is transferred; and - any reasonable instructions notified to it by the Department. 7.3 The Contractor shall comply at all times with the Data Protection Legislation and shall not perform its obligations under this Contract in such a way as to cause the Department to breach any of its applicable obligations under the Data Protection Legislation.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!