Common use of Information Security Policies And Guidelines For Access To Computers Clause in Contracts

Information Security Policies And Guidelines For Access To Computers. Networks and Information By Non-Employee Personnel. 6.2.3.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. This summary provides a convenient reference for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-AMERITECH, respectively, as the providers of the computer, network or information in question. 6.2.3.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Article. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 4 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

AutoNDA by SimpleDocs

Information Security Policies And Guidelines For Access To Computers. Networks and Information By Non-Employee Personnel. 6.2.3.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. This summary provides a convenient reference for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-SBC- AMERITECH, respectively, as the providers of the computer, network or information in question. 6.2.3.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Article. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 2 contracts

Samples: Interconnection Agreement, Interconnection Agreement

Information Security Policies And Guidelines For Access To Computers. Networks and Information By Non-Employee Personnel. 6.2.3.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. This summary provides a convenient reference for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-AMERITECHSBC ILLINOIS, respectively, as the providers of the computer, network or information in question. 6.2.3.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Article. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 1 contract

Samples: Interconnection Agreement

Information Security Policies And Guidelines For Access To Computers. Networks and Information By Non-Employee Personnel. 6.2.3.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. This summary provides a convenient reference for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC AT&T or SBC-AMERITECH, respectively, as the providers of the computer, network or information in question. 6.2.3.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Article. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 1 contract

Samples: Interconnection Agreement

AutoNDA by SimpleDocs

Information Security Policies And Guidelines For Access To Computers. Networks and Information By Non-Non- Employee Personnel. 6.2.3.1 9.4.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. This summary provides a convenient reference Section 9.5 through 9.11 summarizes the general policies and principles for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to CLEC or SBC-AMERITECHAT&T, respectively, as the providers of the computer, network or information in question. 6.2.3.2 9.4.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this ArticleAttachment. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 1 contract

Samples: XDSL Attachment

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!