Common use of Joint Security Requirements Clause in Contracts

Joint Security Requirements. 33.11.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 Each Party shall notify the other party immediately, upon termination of employment of an individual user with approved access to the other Party’s network. 33.11.2.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either CLEC or SBC-13STATE network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 7 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

AutoNDA by SimpleDocs

Joint Security Requirements. 33.11.2.1 6.2.1.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 6.2.1.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement Agreement, or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 6.2.1.3 Each Party shall notify the other party immediately, immediately upon termination of employment of an individual user with approved access to the other Party’s network. 33.11.2.4 6.2.1.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 6.2.1.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which that are made as a result of the user’s access to either the CLEC or SBC-13STATE SBC-AMERITECH network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 6.2.1.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation activation, or distribution and deactivation.

Appears in 5 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

Joint Security Requirements. 33.11.2.1 9.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 9.2.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 Each Party 9.2.3 CLEC shall immediately notify the other party immediately, upon ISCC when a employee userid is no longer valid (e.g. employee termination of employment of an individual user with approved access or movement to the other Party’s networkanother department). 33.11.2.4 9.2.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 9.2.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either the CLEC or SBC-13STATE network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 9.2.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 4 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Resale Agreement

Joint Security Requirements. 33.11.2.1 9.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 9.3.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 Each Party 9.3.3 CLEC shall immediately notify the other party immediatelyAT&T-21STATE when an employee user ID is no longer valid (e.g., upon employee termination of employment of an individual user with approved access or movement to the other Party’s networkanother department). 33.11.2.4 Both 9.3.4 The Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 9.3.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either CLEC CLEC’s or SBC-13STATE AT&T-21STATE’s network. At a minimum, this shall include: include access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 Both 9.3.6 The Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 4 contracts

Samples: Interconnection Agreement, Wholesale Agreement, Wholesale Agreement

Joint Security Requirements. 33.11.2.1 6.2.1.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 6.2.1.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement Agreement, or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 6.2.1.3 Each Party shall notify the other party immediately, immediately upon termination of employment of an individual user with approved access to the other Party’s network. 33.11.2.4 6.2.1.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 6.2.1.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which that are made as a result of the user’s access to either the CLEC or SBC-13STATE SBC- AMERITECH network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 6.2.1.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation activation, or distribution and deactivation.

Appears in 2 contracts

Samples: Interconnection Agreement, Interconnection Agreement

Joint Security Requirements. 33.11.2.1 9.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 9.3.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 Each Party 9.3.3 CLEC shall immediately notify the other party immediately, upon AT&T-21STATE when an employee user ID is no longer valid (e.g. employee termination of employment of an individual user with approved access or movement to the other Party’s networkanother department). 33.11.2.4 Both 9.3.4 The Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 9.3.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either CLEC the CLEC’s or SBC-13STATE AT&T-21STATE’s network. At a minimum, this shall include: include access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 Both 9.3.6 The Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 2 contracts

Samples: Interconnection Agreement, Telecommunications

Joint Security Requirements. 33.11.2.1 6.2.1.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 6.2.1.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 6.2.1.3 Each Party shall notify the other party immediately, upon termination of employment of an individual user with approved access to the other Party’s network. 33.11.2.4 6.2.1.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 6.2.1.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either CLEC the AT&T or SBC-13STATE SBC-AMERITECH network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 6.2.1.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 2 contracts

Samples: Interconnection Agreement, Interconnection Agreement

Joint Security Requirements. 33.11.2.1 11.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 11.2.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 Each 11.2.3 For user IDs established prior to common block ID assignment, each Party shall notify the other party immediately, upon termination of employment of an individual user with approved access to the other Party’s network. 33.11.2.4 11.2.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 11.2.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either CLEC or SBC-13STATE AT&T network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 11.2.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 2 contracts

Samples: MFN Agreement, Interconnection Agreement

Joint Security Requirements. 33.11.2.1 6.2.1.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 6.2.1.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 6.2.1.3 Each Party shall notify the other party immediately, upon termination of employment of an individual user with approved access to the other Party’s network. 33.11.2.4 6.2.1.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 6.2.1.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either the CLEC or SBC-13STATE SBC ILLINOIS network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 6.2.1.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 1 contract

Samples: Interconnection Agreement

AutoNDA by SimpleDocs

Joint Security Requirements. 33.11.2.1 6.2.1.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 6.2.1.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement Agreement, or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 6.2.1.3 Each Party shall notify the other party immediately, immediately upon termination of employment of an individual user with approved access to the other Party’s network. 33.11.2.4 6.2.1.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 6.2.1.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which that are made as a result of the user’s access to either CLEC the AT&T or SBC-13STATE SBC-AMERITECH network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 6.2.1.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation activation, or distribution and deactivation.

Appears in 1 contract

Samples: Interconnection Agreement

Joint Security Requirements. 33.11.2.1 6.2.1.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 6.2.1.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate.. 11-13-03 33.11.2.3 6.2.1.3 Each Party shall notify the other party immediately, upon termination of employment of an individual user with approved access to the other Party’s network. 33.11.2.4 6.2.1.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 6.2.1.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either the CLEC or SBC-13STATE SBC ILLINOIS network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 6.2.1.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 1 contract

Samples: Interconnection Agreement

Joint Security Requirements. 33.11.2.1 6.2.1.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 6.2.1.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement Agreement, or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 6.2.1.3 Each Party shall notify the other party immediately, immediately upon termination of employment of an individual user with approved access to the other Party’s network. 33.11.2.4 6.2.1.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 6.2.1.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which that are made as a result of the user’s access to either the CLEC or SBC-13STATE SBC network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 6.2.1.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation activation, or distribution and deactivation.

Appears in 1 contract

Samples: Interconnection Agreement

Joint Security Requirements. 33.11.2.1 9.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 9.2.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 Each Party 9.2.3 CLEC shall immediately notify the other party immediately, upon ISCC when a employee user ID is no longer valid (e.g. employee termination of employment of an individual user with approved access or movement to the other Party’s networkanother department). 33.11.2.4 9.2.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 9.2.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either the CLEC or SBC-13STATE network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or Page 76 of 113 device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 9.2.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 1 contract

Samples: Interconnection Agreement

Joint Security Requirements. 33.11.2.1 9.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 33.11.2.2 9.2.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, userID user ID assignment, user request records, system configuration, and time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate. 33.11.2.3 Each 9.2.3 For User IDs established prior to common block ID assignment, each Party shall notify the other party immediately, Party immediately upon termination of employment of an individual user with approved access to the other Party’s networknetwork or when an employee user id is no longer valid. 33.11.2.4 9.2.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. 33.11.2.5 9.2.5 All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which that are made as a result of the user’s access to either the CLEC or SBC-13STATE AT&T network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards. 33.11.2.6 9.2.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.

Appears in 1 contract

Samples: XDSL Attachment

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!