Common use of Information Security Policies Clause in Contracts

Information Security Policies. And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 6.2.3.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. This summary provides a convenient reference for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to AT&T or SBC-AMERITECH, respectively, as the providers of the computer, network or information in question. 6.2.3.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Article. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 2 contracts

Samples: Interconnection Agreement, Interconnection Agreement

AutoNDA by SimpleDocs

Information Security Policies. And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 6.2.3.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. This summary provides a convenient reference for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to AT&T CLEC or SBC-AMERITECH, respectively, as the providers of the computer, network or information in question. 6.2.3.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Article. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 1 contract

Samples: Interconnection Agreement

AutoNDA by SimpleDocs

Information Security Policies. And Guidelines For Access To Computers, Networks and Information By Non-Employee Personnel. 6.2.3.1 Information security policies and guidelines are designed to protect the integrity, confidentiality and availability of computer, networks and information resources. This summary provides a convenient reference for individuals who are not employees of the Party that provides the computer, network or information, but have authorized access to that Party’s systems, networks or information. Questions should be referred to AT&T CLEC or SBC-AMERITECH, respectively, as the providers of the computer, network or information in question. 6.2.3.2 It is each Party’s responsibility to notify its employees, contractors and vendors who will have access to the other Party’s network, on the proper security responsibilities identified within this Article. Adherence to these policies is a requirement for continued access to the other Party’s systems, networks or information. Exceptions to the policies must be requested in writing and approved by the other Party’s information security organization.

Appears in 1 contract

Samples: Interconnection Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!