Email Protection Sample Clauses

Email Protection. Email Protection is our SPAM filtering service that can be used in conjunction with C Spire Business email products. Email Protection provides the most comprehensive and effective SPAM-blocking product available, blocking 99 percent of SPAM and providing an industry-leading low false positive rate. C Spire Business will provide the following support for this Service: • C Spire Business will work with Customers to ensure firewalls are configured to accept email only from the filtering service. • Implementation of full recipient validation. • C Spire Business will work with Customer to ensure no dangerous file types are allowed to transit. • Blocking or holding of encrypted zip files or email components. The availability of Email Protection Service is dependent on the following: • C Spire Hosted Exchange or Office 365 • Suitable network transport from SaaS platform to mail systems. The following options may be added to the Email Protection Service. Description of these options in no way entitles Customer to the feature, unless specified by C Spire Business and Customer in the signed Quote or signed evaluation of a Service Change request. A separate Order or Statement of Work may apply to such options and may have additional costs associated with them. Options below may not be compatible with all variants of Email Protection Service. Email Archiving will provide archival of all incoming, outgoing, and internal emails to a separate server and provide eDiscovery, allowing easy retrieval for legal discovery. Archive is not intended to be a backup solution for email, but a retrieval system in cases of litigation or business need.
AutoNDA by SimpleDocs
Email Protection. Email Protection is licensed on a User basis. When using Email Protection Customer is responsible for all activities conducted under its user logins. Email Protection is for use with normal business messaging traffic only, and Customer shall not use Email Protection for the machine generated message delivery of bulk or unsolicited emails or emails sent from an account not assigned to an individual. Customer is responsible for maintaining the outbound email filtering Email Protection configuration settings to block emails identified by Proofpoint as either containing a virus or having a spam score of ninety-five (95) or higher. If Proofpoint has reason to believe that Customer has modified the outbound email configuration setting, Proofpoint reserves the right to monitor and reset such settings. Customer is solely responsible for any damage or loss to a third party resulting from the Customer's own use of the Proofpoint Product in violation of: (a) applicable law; or (b) the terms and conditions of the Agreement. Each User must be assigned a separate account on Customer’s email server for sending or receiving messages or data within Customer’s email system or network. Mail Routing Agent. Customer is responsible for maintaining the outbound email filtering MRA configuration settings established by Proofpoint to filter and block emails identified by Proofpoint as either containing a virus or having a spam score of 95 or higher. If Proofpoint has reason to believe that Customer has modified the outbound email configuration setting, Proofpoint reserves the right to monitor and reset such settings.
Email Protection. Email Protection is licensed on a User basis. When using Email Protection Customer is responsible for all activities conducted under its user logins. Email Protection is for use with normal business messaging traffic only, and Customer shall not use Email Protection for the machine generated message delivery of bulk or unsolicited emails or emails sent from an account not assigned to an individual. Internal Threat Management (ITM) SaaS. ITM SaaS deploys software (an Agent) onto Customer owned or controlled desktops and servers on supported platforms. These Agents capture metadata (Metadata Capture) and visual screen content (Visual Capture) recorded from the activities of monitored Users and store this data in Proofpoint’s ITM SaaS service. ITM SaaS Metadata Feed allows Customer to export its captured User metadata. A licensed User of ITM SaaS is a unique individual with a unique access credential being monitored by Customer, regardless of whether the Agents are deployed on physical or virtual systems. If an individual has more than one access credential, then a separate User license for each of that individual’s unique access credentials must be purchased. A licensed User of ITM SaaS may also be a unique Server (physical or virtual) with a unique access credential being monitored by the Customer. ITM SaaS Metadata Capture, and ITM SaaS Metadata Capture with Visual Capture, are subject to the ingestion rate(s) and retention time tiers described in the Proofpoint quote or Order Form. Additionally, both the ITM SaaS Metadata Capture with Visual Capture and ITM Additional Visual Capture are further subject to the aggregate data storage limit(s) described in the Proofpoint quote or Order Form. ITM SaaS Metadata Feed is subject to a maximum monthly export amount as described in the Proofpoint quote or Order Form. Excessive ingestion of User activities may lead to local caching on an Agent or throttling of transmission to the cloud. Proofpoint reserves the right to require that the Customer pay additional fees when any ingestion, storage, and/or export limit is exceeded. Mail Routing Agent. Customer is responsible for maintaining the outbound email filtering MRA configuration settings established by Proofpoint to filter and block emails identified by Proofpoint as either containing a virus or having a spam score of 95 or higher. If Proofpoint has reason to believe that Customer has modified the outbound email configuration setting, Proofpoint reserves the right ...
Email Protection. Protection against email-born security threats including phishing, malware, spam, and other forms of objectionable or dangerous content. • Annual Comprehensive Vulnerability Scan o An assessment solution to pinpoint vulnerabilities, configuration issues, and malware that attackers use to penetrate a network. o Each scan provides insights into the vulnerabilities along with remediation suggestions. • SIEM/SOC Service o Within our security incident and event management platform, a dedicated team of security analysts monitors the logs and live events received from your critical IT devices and rapidly respond to detected threats to your business data. In addition, our analysts perform a daily review of all logs and security event notifications 7x365. o Cost-efficient monitoring, detection and response meets regulatory requirements, including HIPAA, PCI-DSS, GLBA, SOX, NIST, to name a few. • CTSI eSecure Email Filtering - Advanced o Protection against email-born security threats including phishing, malware, spam, and other forms of objectionable or dangerous content.
Email Protection. Xxxx defends employee inboxes against various attacks, including:

Related to Email Protection

  • Legal Protection 7.14.1 The University shall provide legal representation to any Member of the Bargaining Unit who is named a defendant in a civil action based on performance of the Member’s duties within the scope of employment. Legal representation will be at the Member’s request, subject to the approval of the Ohio Attorney General and in accordance with Ohio law. Pursuant to Ohio Revised Code Section 9.87 the University shall seek indemnification from the state for liability or judgment of any Member of the Bargaining Unit resulting from the performance of his or her duties for the University. Nothing in this Section is intended to expand or conflict with current Ohio law. 7.14.2 As long as the University continues to provide liability insurance coverage pursuant to ORC 3345.202 for any member of the University Board of Trustees or any University officer, the University shall continue to provide that level of liability insurance coverage for each Bargaining Unit Faculty Member.

  • Environmental Protection (i) Except as set forth in Schedule 9 attached hereto, neither the Borrower nor any of its Restricted Subsidiaries nor any of their respective Real Property or operations are subject to any outstanding written order, consent decree or settlement agreement with any Person relating to (A) any Environmental Law, (B) any Environmental Claim or (C) any Hazardous Materials Activity; (ii) Neither the Borrower nor any of its Restricted Subsidiaries has received any letter or written request for information under Section 104 of the Comprehensive Environmental Response, Compensation and Liability Act (42 U.S.C. § 9604) or any comparable state law; (iii) There are no and, to the Borrower’s knowledge, have been no conditions, occurrences, or Hazardous Materials Activities which could reasonably be expected to form the basis of an Environmental Claim against the Borrower or any of its Restricted Subsidiaries that, individually or in the aggregate, could reasonably be expected to have a Materially Adverse Effect; (iv) Neither the Borrower nor any of its Restricted Subsidiaries, nor, to the Borrower’s knowledge, any predecessor of the Borrower or any of its Restricted Subsidiaries has filed any notice under any Environmental Law indicating past or present Release of Hazardous Materials on any Real Property, and neither the Borrower nor any of its Restricted Subsidiaries’ operations involves the generation, transportation, treatment, storage or disposal of hazardous waste (other than hazardous waste generated in the ordinary course of business, and which is not reasonably likely to materially adversely affect the Real Property or have a Materially Adverse Effect), as defined under 40 C.F.R. Parts 260-270 or any state equivalent; and (v) Compliance with all current requirements pursuant to or under Environmental Laws will not, individually or in the aggregate, have a reasonable possibility of giving rise to a Materially Adverse Effect. Notwithstanding anything in this Section 4.1(z) to the contrary, to the knowledge of Borrower or any of its Restricted Subsidiaries, no event or condition has occurred or is occurring with respect to the Borrower or any of its Restricted Subsidiaries relating to any Environmental Law, any Release of Hazardous Materials, or any Hazardous Materials Activity which individually or in the aggregate has had or could reasonably be expected to have a Materially Adverse Effect.

  • Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position: (a) At the equivalent salary, grading; (b) At the equivalent weekly hours of duty; (c) In the same location or other location within reasonable commuting distance; and (d) Involving responsibilities broadly comparable to those experienced in the previous position. 15.9.2 Where applicable, employees shall continue to be awarded increments when their incremental date falls during absence on parental leave.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • SAFETY AND HEALTH 28.01 The Co-operative agrees to establish a Joint Safety and Health Committee which shall meet quarterly during regular working hours and which shall conduct safety tours of the Co-operative’s operation. The committee shall be comprised of two (2) bargaining unit employees chosen by the Union and two (2) management persons. A full-time Union Representative may also attend these meetings from time to time. Minutes of all meetings that occur shall be kept and a copy shall be given to each member of the committee and, as well, a copy shall be posted on the bulletin board for all employees to see. The Co-operative shall fax or email a copy of such minutes to the Union Office within fourteen (14) calendar days of completion of the meeting. The chairperson of this committee shall rotate from meeting to meeting to ensure that there is an equal balance of representation in this position between management and the employees. 28.02 All employees of the Joint Safety and Health Committee shall receive the necessary time off with pay when conducting business in accordance with sub-article 28.01 above. 28.03 The Co-operative shall allow time off with pay as required by provincial legislation for the purpose of allowing the bargaining unit employees, who are on the Joint Safety and Health Committee to attend Union approved safety and health seminars, courses or conferences for job improvement. The time and scheduling of this time off is to be mutually agreed upon between the Co-operative and the Union. Additional time off without pay shall be granted to the bargaining unit employees if so requested by the Union. The Co-operative will pay said employees as if they had been at work and the Union agrees to reimburse the Co-operative for any payments in regard to wages and benefits paid to the employee. 28.04 In situations where an employee believes that a safety and/or health hazard exists, the employee shall first report their concerns to the Joint Safety and Health Committee. If immediate action to correct the situation is not taken or if the employee is told that corrective action is not necessary but nevertheless continues to believe that a safety and/or health hazard exists, the employee shall be entitled to refuse to perform that particular job function until such time as a person from the appropriate government agency dealing with safety and health matters has come to the Co-operative's premises to inspect the concerns firsthand. During this time period the employee shall be assigned to perform other job functions that they are capable of doing. 28.05 A first aid station and an eye wash station shall be provided for and maintained on the Co-operative's premises and shall be available for employees to use when they are at work. 28.06 The Co-operative and the Union agree to share the cost of the fee for a Standard First Aid & CPR training course for any members of the bargaining unit who are on the Health & Safety Committee who wish to take same.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!