Internal Firewall Sample Clauses

Internal Firewall. 993 The Contractor shall provide and manage a state-of-the-art, highly available internal firewall 994 service component to protect the ECHA perimeter (for the concept of perimeter ref. Section 5). 995 The Contractor shall take over ECHA’s existing configuration (ref. Annex 1: IT Infrastructure 996 Architecture (CMO)) and migrate it to the offered service. 997 In particular, ECHA uses AD integration to power the internal firewall rules. Therefore, the offered 998 internal firewall function shall support integration with the ECHA’s Active Directory for automatic 999 firewall ruleset creation based on AD users, groups and computer accounts. This functionality 1000 shall also be applicable to access from the LAN network to the managed datacentre.
AutoNDA by SimpleDocs

Related to Internal Firewall

  • External Appeals For appeals of a decision that a prescription drug is not covered because it is not on our formulary, please see the Formulary Exception Process in the Prescription Drug and Diabetic Equipment and Supplies section. When filing a reconsideration or an appeal, please provide the same information listed in the Complaints section above.

  • INTERNAL MAIL 1. The Association shall have reasonable access to inter-school mail.

  • External monitoring The external monitoring and audit referred to in Articles 11.1, 11.2, 11.3 and 11.4 of the Regulation shall not in any way relieve the National Focal Point or the Programme Operator of their obligations under the legal framework regarding monitoring of the Programme and/or its projects, financial control and audit.

  • Internal Use You will use the Services for Your own internal business, non-residential and non-personal use. You acknowledge and agree that You will not allow any third party, including Your vendors and service providers, to access or use the Services unless such third party is allowed access for the purpose of providing authorized customer support services or in connection with Your appropriate use of the Services for Your own business purposes.

  • Internal Audit (1) Within sixty (60) days, the Board shall adopt, implement, and thereafter ensure Bank adherence to an independent, internal audit program sufficient to:

  • External Audit (a) The Beneficiary or the Executing Agency, as the case may be, shall present to the Bank, during the period of Project execution and within the deadlines and with the frequency provided in the Special Conditions of this Agreement, the Project’s financial statements and other reports, and any additional financial information relating thereto that the Bank may request, in accordance with accounting principles and standards acceptable to the Bank.

  • Internal Investigations (A) The parties recognize that Florida Highway Patrol personnel occupy a special place in American society. Therefore, it is understood that the state has the right to expect that a professional standard of conduct be adhered to by all Florida Highway Patrol personnel regardless of rank or assignment. Since internal investigations may be undertaken to inquire into complaints of Florida Highway Patrol misconduct, the state reserves the right to conduct such investigations to uncover the facts in each case, but expressly agrees to carefully guard and protect the rights and dignity of accused personnel. In the course of an internal investigation, the investigative methods employed will be consistent with the law (including but not limited to section 112.532, Florida Statutes) and this agreement; nothing in this agreement, however, shall be deemed to diminish the rights of employees under applicable law.

  • Internal Control Effective control and accountability must be maintained for all cash, real and personal property, and other assets. Grantee must adequately safeguard all such property and must provide assurance that it is used solely for authorized purposes. Grantee must also have systems in place that provide reasonable assurance that the information is accurate, allowable, and compliant with the terms and conditions of this Agreement. 2 CFR 200.303.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

Time is Money Join Law Insider Premium to draft better contracts faster.