HCA NETWORK SECURITY Sample Clauses

HCA NETWORK SECURITY. Contractor agrees not to attach any Contractor-supplied computers, peripherals or software to the HCA Network without prior written authorization from HCA’s Chief Information Officer. Unauthorized access to HCA networks and systems is a violation of HCA Policy and constitutes computer trespass in the first degree pursuant to RCW 9A.52.110. Violation of any of these laws or policies could result in termination of the contract and other penalties. Contractor will have access to the HCA visitor Wi-Fi Internet connection while on site.
AutoNDA by SimpleDocs
HCA NETWORK SECURITY. Conquer agrees not to attach any Conquer-supplied computers, peripherals or software Officer. Unauthorized access to HCA networks and systems is a violation of HCA Policy and constitutes computer trespass in the first degree pursuant to RCW 9A.52.110. Violation of any of these laws or policies could result in termination of the contract and other penalties.

Related to HCA NETWORK SECURITY

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Unbundled Digital Loops 2.3.1 BellSouth will offer Unbundled Digital Loops (UDL). UDLs are service specific, will be designed, will be provisioned with test points (where appropriate), and will come standard with OC and a DLR. The various UDLs are intended to support a specific digital transmission scheme or service. 2.3.2 BellSouth shall make available the following UDLs, subject to restrictions set forth herein:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!