Common use of Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel Clause in Contracts

Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section 9.5 - 9.11 summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATE, respectively, as the providers of the computer, network or information in question. 9.4.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Attachment. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 5 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Resale Agreement

AutoNDA by SimpleDocs

Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 9.5.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section 9.5 - 9.11 9.6 below through Section 9.12 below inclusive summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATEAT&T-21STATE, respectively, as the providers of the computer, network or information in question. 9.4.2 9.5.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Attachment. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 1 contract

Samples: Wholesale Agreement

Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section 9.5 - 9.11 summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATE, respectively, as the providers of the computer, network or information in question. 9.4.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Attachment. Adherence to these policies is a requirement for continued access to the other Party’s systems, Page 77 of 113 networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 1 contract

Samples: Interconnection Agreement

AutoNDA by SimpleDocs

Information Security Policies And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 9.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. Section 9.5 - 9.11 summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-13STATEAT&T-13STATE, respectively, as the providers of the computer, network or information in question. 9.4.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Attachment. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 1 contract

Samples: Interconnection Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!