Deploy Security Content Sample Clauses

Deploy Security Content. During the provisioning phase, security content will be deployed to the Client’s Azure Sentinel instance including, but not limited to correlations, workbooks, data connectors, and playbooks.
AutoNDA by SimpleDocs

Related to Deploy Security Content

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Unbundled Loop Concentration (ULC) System 2.5.1 BellSouth will provide to <<customer_name>> Unbundled Loop Concentration (ULC). Loop concentration systems in the central office concentrate the signals transmitted over local loops onto a digital loop carrier system. The concentration device is placed inside a BellSouth central office. BellSouth will offer ULC with a TR008 interface or a TR303 interface.

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • Streaming The Licensee is entitled to an unlimited amount audio streams (on all streaming platforms such as Spotify) and unlimited video streams (on all platforms supporting video such as Youtube) for the song(s) created with the composition. All streaming royalties generated by the Licensee's song(s) belong to the Licensee.

  • Unbundled Loop Concentration 2.8.5.1 Upon the Effective Date of this Amendment, the Unbundled Loop Concentration (ULC) element will no longer be offered by BellSouth and no new orders for ULC will be accepted. Any existing ULCs that were provisioned prior to the Effective Date of this Amendment will be grandfathered at the rates set forth in the Parties’ interconnection agreement that was in effect immediately prior to this Amendment and may remain connected, maintained and repaired according to BellSouth’s TR73600 until such time as they are disconnected by MyLineToo, or BellSouth provides ninety (90) calendar days notice that such ULC must be terminated.

  • Unbundled Sub-Loop Concentration System (USLC 2.9.1 Where facilities permit and where necessary to comply with an effective Commission order, BellSouth will provide <<customer_name>> with the ability to concentrate its sub-loops onto multiple DS1s back to the BellSouth Central Office. The DS1s will then be terminated into <<customer_name>>’s collocation space. TR-008 and TR303 interface standards are available.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

Time is Money Join Law Insider Premium to draft better contracts faster.