Email Protection Sample Clauses

Email Protection. Email Protection is our SPAM filtering service that can be used in conjunction with C Spire Business email products. Email Protection provides the most comprehensive and effective SPAM-blocking product available, blocking 99 percent of SPAM and providing an industry-leading low false positive rate. C Spire Business will provide the following support for this Service: • C Spire Business will work with Customers to ensure firewalls are configured to accept email only from the filtering service. • Implementation of full recipient validation. • C Spire Business will work with Customer to ensure no dangerous file types are allowed to transit. • Blocking or holding of encrypted zip files or email components. EMAIL PROTECTION AVAILABILITY DEPENDENCIES The availability of Email Protection Service is dependent on the following: • C Spire Hosted Exchange or Office 365 • Suitable network transport from SaaS platform to mail systems. EMAIL PROTECTION ADD-ON OPTIONS The following options may be added to the Email Protection Service. Description of these options in no way entitles Customer to the feature, unless specified by C Spire Business and Customer in the signed Quote or signed evaluation of a Service Change request. A separate Order or Statement of Work may apply to such options and may have additional costs associated with them. Options below may not be compatible with all variants of Email Protection Service. EMAIL ARCHIVING Email Archiving will provide archival of all incoming, outgoing, and internal emails to a separate server and provide eDiscovery, allowing easy retrieval for legal discovery. Archive is not intended to be a backup solution for email, but a retrieval system in cases of litigation or business need.
AutoNDA by SimpleDocs
Email Protection a. Xxxx defends employee inboxes against various attacks, including:
Email Protection. Email Protection is licensed on a User basis. When using Email Protection Customer is responsible for all activities conducted under its user logins. Email Protection is for use with normal business messaging traffic only, and Customer shall not use Email Protection for the machine generated message delivery of bulk or unsolicited emails or emails sent from an account not assigned to an individual. Customer is responsible for maintaining the outbound email filtering Email Protection configuration settings to block emails identified by Proofpoint as either containing a virus or having a spam score of ninety-five (95) or higher. If Proofpoint has reason to believe that Customer has modified the outbound email configuration setting, Proofpoint reserves the right to monitor and reset such settings. Customer is solely responsible for any damage or loss to a third party resulting from the Customer's own use of the Proofpoint Product in violation of: (a) applicable law; or (b) the terms and conditions of the Agreement. Each User must be assigned a separate account on Customer’s email server for sending or receiving messages or data within Customer’s email system or network. Internal Threat Management (ITM) SaaS. ITM SaaS deploys software (an Agent) onto Customer owned or controlled desktops and servers on supported platforms. These Agents capture metadata (Metadata Capture) and visual screen content (Visual Capture) recorded from the activities of monitored Users and store this data in Proofpoint’s ITM SaaS service. ITM SaaS Metadata Feed allows Customer to export its captured User metadata. A licensed User of ITM SaaS is a unique individual with a unique access credential being monitored by Customer, regardless of whether the Agents are deployed on physical or virtual systems. If an individual has more than one access credential, then a separate User license for each of that individual’s unique access credentials must be purchased. A licensed User of ITM SaaS may also be a unique Server (physical or virtual) with a unique access credential being monitored by the Customer. ITM SaaS Metadata Capture, and ITM SaaS Metadata Capture with Visual Capture, are subject to the ingestion rate(s) and retention time tiers described in the Proofpoint quote or Order Form. Additionally, both the ITM SaaS Metadata Capture with Visual Capture and ITM Additional Visual Capture are further subject to the aggregate data storage limit(s) described in the Proofpoint quote or Order For...
Email Protection. Email Protection is licensed on a User basis. When using Email Protection Customer is responsible for all activities conducted under its user logins. Email Protection is for use with normal business messaging traffic only, and Customer shall not use Email Protection for the machine generated message delivery of bulk or unsolicited emails or emails sent from an account not assigned to an individual. Customer is responsible for maintaining the outbound email filtering Email Protection configuration settings to block emails identified by Proofpoint as either containing a virus or having a spam score of ninety-five (95) or higher. If Proofpoint has reason to believe that Customer has modified the outbound email configuration setting, Proofpoint reserves the right to monitor and reset such settings. Customer is solely responsible for any damage or loss to a third party resulting from the Customer's own use of the Proofpoint Product in violation of: (a) applicable law; or (b) the terms and conditions of the Agreement. Each User must be assigned a separate account on Customer’s email server for sending or receiving messages or data within Customer’s email system or network. Mail Routing Agent. Customer is responsible for maintaining the outbound email filtering MRA configuration settings established by Proofpoint to filter and block emails identified by Proofpoint as either containing a virus or having a spam score of 95 or higher. If Proofpoint has reason to believe that Customer has modified the outbound email configuration setting, Proofpoint reserves the right to monitor and reset such settings.
Email Protection. Protection against email-born security threats including phishing, malware, spam, and other forms of objectionable or dangerous content. Cyber Security Features that have been added to the new CTSNet Assurance with Cyber Defense Plan: • Annual Comprehensive Vulnerability Scan o An assessment solution to pinpoint vulnerabilities, configuration issues, and malware that attackers use to penetrate a network. o Each scan provides insights into the vulnerabilities along with remediation suggestions. • SIEM/SOC Service o Within our security incident and event management platform, a dedicated team of security analysts monitors the logs and live events received from your critical IT devices and rapidly respond to detected threats to your business data. In addition, our analysts perform a daily review of all logs and security event notifications 7x365. o Cost-efficient monitoring, detection and response meets regulatory requirements, including HIPAA, PCI-DSS, GLBA, SOX, NIST, to name a few. • CTSI eSecure Email Filtering - Advanced o Protection against email-born security threats including phishing, malware, spam, and other forms of objectionable or dangerous content.

Related to Email Protection

  • Environmental Protection Except as set forth in Schedule 5.13 annexed hereto:

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes:

  • Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position:

Time is Money Join Law Insider Premium to draft better contracts faster.