Email Security Sample Clauses

Email Security. Verizon reserves the right in our sole discretion to provide the level of security we deem appropriate to safeguard our network and customers, and other Internet users, against Internet threats or abuses, including viruses, spam and phishing threats. These security measures may include, but are not limited to, the use of firewalls and blocklists to block potentially harmful or abusive emails or attachments, anti-spam filters, anti-virus and anti-spyware software, and blocking selected ports. Such activities may result in the blocking, filtering or non-delivery of legitimate and non-legitimate email sent to or from your email account. By using any Verizon, Verizon Affiliate or third party email service, you agree that delivery and receipt of email is not guaranteed and to Verizon's use of such Internet and email security measures we in our sole discretion deem appropriate.
AutoNDA by SimpleDocs
Email Security. Verizon reserves the right in our sole discretion to provide the level of security we deem appropriate to safeguard our network and customers, and other Internet users, against Internet threats or abuses, including without limitations, viruses, spam, phishing, identity theft and any other potentially disabling or harmful threat or abuse. These security measures may include but are not limited to, the use of firewalls and blocklists to block potentially harmful or abusive emails or attachments, anti-spam filters anti-virus or anti-spyware software, or blocking selected ports. Such activities may result in the blocking, filtering or non-delivery of legitimate and non-legitimate email sent to or from your email account. By using any Verizon-provided email service, you agree that delivery and receipt of email is not guaranteed and to Verizon's use of such Internet and email security measures we in our sole discretion deem appropriate.
Email Security. The Email Security provisions in Section 13 (c) apply to the EM Service. By using the EM Service (or any Verizon-provided email service), you agree that email delivery and receipt is not guaranteed and to Verizon's use of such Internet and email security measures we in our sole discretion deem appropriate.
Email Security. If Convercent is sending emails to Customer customers or employees, appropriate email identity solutions, including but not limited to DKIM, SPF, and DMARC, will be utilized.
Email Security. All emails that include DHCS PHI must be sent in an encrypted method using a DHCS approved solution or a solution using a vendor product specified on the CSSI.
Email Security. (EMS): Email Security (EMS) from Censornet is a 100% cloud-based service that analyzes email traffic and removes unwanted or malicious messages. The service scans all inbound (and outbound) messages for threats including malware and phishing attacks, and examines URLs embedded in messages protecting users from inappropriate or malicious web pages. Organisations route email through Censornet’s Cloud by changing their MX record. We use world-class, highly accredited providers to deliver EMS that include Amazon, IBM and Microsoft. In Europe specific data centre locations include Frankfurt, Dublin and Amsterdam. Organizations choose which data centre or centres process their mail. Email messages flow through the infrastructure within the selected data centre(s) above and are checked for spam and viruses and other content. If the message is ‘clean’ it is logged and delivered to the customer’s email server. The conversation with the customer’s email server is also logged. Log information includes IP addresses, To, From and Subject fields, server responses, and other metadata, but does not include the message body or any file attachments. Log data is stored in the same data centre that processes email traffic. Some log data may be replicated for reporting and visualization. The location of this data is selected at the time of account provisioning with London or Frankfurt the options within Europe. During processing the message is written to disk. Once delivered to the customer’s email server it is immediately deleted. This typically takes no more than a few seconds. If a message is determined to be spam then the message may optionally be written to a quarantine where it is stored for thirty (30) days. Organization’s may choose to delete spam rather than quarantine it. The quarantine is located in the same data centre that processes email traffic.
Email Security. If you are sending emails to eBay customers, appropriate email identity solutions, including but not limited to DKIM, SPF, and DMARC, will be utilized. If you utilize eBay-owned domain names to send emails, you will adhere to the eBay Email Security requirements, provided upon request.
AutoNDA by SimpleDocs
Email Security. All emails that include DHCS data must be sent in an encrypted method using a University of California approved solution which is comparable to a solution using a CSSI vendor product.
Email Security. By enabling the SMS to Email gateway feature on the 000-xxx.xxx SMS platform You agree to be entirely responsible for all payments and all activities that occur via the Email to SMS gateway through Your account; be liable for any damage, loss or costs that We or any third party sustain as a result of any of Your actions, or any actions of a third party using Your account. For Your security, by default, a Security Token system is enabled with our Email services, whereby each sent SMS message must have an embed password (Security Token) embedded in the email. This allows our Email to SMS Service to authenticate the email as having originated from You. If You choose to disable the Security Token Security You accept and understand the potential risks associated with that. Should you require clarity on the risks associated with disabling this security feature You must contact our Helpdesk before disabling the feature.
Email Security. All emails that include PHI or PI shall be sent by Business Associate in an encrypted method using encryption processes for data in motion complying, as applicable, with National Institute of Standards and Technology (“NIST”) Special Publications 800-52, Guidelines for the Selection and Use of Transport Layer Security (“TLS”) Implementations; 800-77, Guide to IPsec VPNs; or 800-113, Guide to SSL VPNs, or other encryption processes which are Federal Information Processing Standards (“FIPS”) 140-2 validated.
Time is Money Join Law Insider Premium to draft better contracts faster.