Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section 9.5 - 9.11 summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATE, respectively, as the providers of the computer, network or information in question. 9.4.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Attachment. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.
Appears in 5 contracts
Samples: Interconnection Agreement, Interconnection Agreement, Resale Agreement
Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 9.5.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section 9.5 - 9.11 9.6 below through Section 9.12 below inclusive summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATEAT&T-21STATE, respectively, as the providers of the computer, network or information in question.
9.4.2 9.5.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Attachment. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.
Appears in 1 contract
Samples: Wholesale Agreement
Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section 9.5 - 9.11 summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATE, respectively, as the providers of the computer, network or information in question.
9.4.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Attachment. Adherence to these policies is a requirement for continued access to the other Party’s systems, Page 77 of 113 networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.
Appears in 1 contract
Samples: Interconnection Agreement
Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section 9.5 - 9.11 summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATEAT&T-13STATE, respectively, as the providers of the computer, network or information in question.
9.4.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Attachment. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.
Appears in 1 contract
Samples: Interconnection Agreement