Firewall Protection. Use of encryption methods of electronic COUNTY data while in transit from AUTHORITY networks to external networks, when applicable.
Firewall Protection. WALNUT HILL is not responsible for any external intrusion to Customer’s network equipment. Customer is responsible for providing firewall protection in an effort to help prevent intrusions. Since this service is an “Always On” connection, it is WALNUT HILL’s recommendation that Customer have appropriate firewall protection on Customer’s equipment when using WALNUT HILL’s High-Speed Internet Service.
Firewall Protection. Use of encryption methods of electronic COUNTY data while in transit from CONTRACTOR networks to external networks, when applicable.
Firewall Protection. Firewall Protection – MOKAN COMMUNICATIONS INC is not responsible for any external intrusion to Customer’s network equipment. Customer is responsible for providing firewall protection in an effort to help prevent intrusions. Since this service is an “Always On” connection, it is MOKAN COMMUNICATIONS INC recommendation that Customer have appropriate firewall protection on Customer’s equipment when using MOKAN COMMUNICATIONS INC High-Speed Internet Service.
Firewall Protection the Vendor agrees to ensure properly configured firewall protection on all equipment used to access NYSED’s equipment/network.
Firewall Protection. Firewall Protection – OFMTC is not responsible for any external intrusion to Customer’s network equipment. Customer is responsible for providing firewall protection in an effort to help prevent intrusions. Since this service is an “Always On” connection, it is OFMTC’s recommendation that Customer have appropriate firewall protection on Customer’s equipment when using OFMTC’s High-Speed Internet Service.
Firewall Protection. In addition to conforming to the confidentiality provisions in this Article 7, the following shall apply:
(a) IM will construct an IP firewall as described below in this Section around IM employees providing Services to ATMI in connection with any Wets Workflow described in the Purchase Documentation. Only such employees of IM will be allowed to have access to such ATMI confidential and proprietary information and information distribution will be based strictly on a need-to-know basis. Such employees of IM shall solely use such ATMI confidential and proprietary information in providing Services to ATMI. Physical copies of ATMI confidential and proprietary information shall be securely locked when not in use such that only those IM employees providing such Services shall have access to such information. The procedure set forth in this Section is not intended to supersede in whole or in part the terms of Section 4.8; specifically, IM shall have the right, without obligation to ATMI, to sell, license and sublicense any improvements, changes, or modifications to Equipment disclosed by ATMI to IM outside of the Formal Disclosure process.
(b) ATMI will construct an IP firewall as described below in this Section around ATMI employees who have access at IM’s facilities to HPC Technology outside of the Wets Workflow described in the Purchase Documentation. Only such employees of ATMI will be allowed to have access to such IM confidential and proprietary information and such information shall not be shared with other ATMI employees or Third Parties without the prior written consent of IM. Copies or samples of IM confidential and proprietary information shall not be removed or transmitted from any IM facility by ATMI employees.
Firewall Protection. In addition to conforming to the confidentiality provisions in this Article 7, the following shall apply:
7.5.1 IM will construct an IP firewall as described below in this Section around IM employees providing Services to Customer in connection with the Dry Workflow purchased herein. Only such employees of IM will be allowed to have access to such Customer confidential and proprietary information and information distribution will be based strictly on a need-to-know basis. Such employees of IM shall solely use such Customer confidential and proprietary information in providing Services to Customer. Physical copies of Customer confidential and proprietary information shall be securely locked when not in use such that only those IM employees providing such Services shall have access to such information.
7.5.2 Customer will construct an IP firewall as described below in this Section around Customer employees who have access at IM’s facilities to Dry HPC Technology outside of the Dry Workflow purchased hereunder. Only such employees of Customer will be allowed to have access to such IM confidential and proprietary information and such information shall not be shared with other Customer employees or Third Parties without the prior written consent of IM. Copies or samples of IM confidential and proprietary information shall not be removed or transmitted from any IM facility by Customer employees.
Firewall Protection. Use of encryption methods of electronic COUNTY data while in transit from SCTCA networks to external networks, when applicable.
Firewall Protection. Use of encryption methods of electronic