Masergy Network Security Sample Clauses

Masergy Network Security. Masergy acknowledges and agrees that Masergy is responsible for Masergy’s data, applications, devices and network, including without limitation the software, equipment and any Internet connections controlled by Masergy to provide the Software or Services (collectively, the “Masergy Network”). More particularly, Masergy is responsible for the virtual and physical security of the Masergy Network and the development of reasonable physical and virtual security safeguards, policies, and procedures, including, without limitation, the use of industry recognized internet security, intrusion detection, and antivirus software. Masergy agrees to take commercially reasonable steps to protect virtual and physical access to the Software and Services originating from the Masergy Network.
AutoNDA by SimpleDocs
Masergy Network Security. Masergy acknowledges and agrees that Masergy is responsible for Masergy’s data, applications, devices and network, including without limitation the software, and equipment (collectively, the “Masergy Network”). More particularly, Masergy is responsible for the virtual and physical security of the Masergy Network and the development of reasonable physical and virtual security safeguards, policies, and procedures, including, without limitation, the use of intrusion detection, and antivirus software. Masergy agrees to take commercially reasonable steps to protect virtual and physical access to the Masergy Network.

Related to Masergy Network Security

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • BELLSOUTH OUTAGE Because BellSouth's equipment has varying degrees of impact on the service provided to the CLECs, restoring service from damaged BellSouth equipment is different. The outage will probably impact a number of Carriers simultaneously. However, the ECC will be able to initiate immediate actions to correct the problem. A disaster involving any of BellSouth's equipment locations could impact the CLECs, some more than others. A disaster at a Central Office (CO) would only impact the delivery of traffic to and from that one location, but the incident could affect many Carriers. If the Central Office is a Serving Wire Center (SWC), then traffic from the entire area to those Carriers served from that switch would also be impacted. If the switch functions as an Access Tandem, or there is a tandem in the building, traffic from every CO to every CLEC could be interrupted. A disaster that destroys a facility hub could disrupt various traffic flows, even though the switching equipment may be unaffected. The NMC would be the first group to observe a problem involving BellSouth's equipment. Shortly after a disaster, the NMC will begin applying controls and finding re-routes for the completion of as much traffic as possible. These reroutes may involve delivering traffic to alternate Carriers upon receiving approval from the CLECs involved. In some cases, changes in translations will be required. If the outage is caused by the destruction of equipment, then the ECC will assume control of the restoration.

  • Conversion of Wholesale Services to Network Elements or Network Elements to Wholesale Services Upon request, AT&T shall convert a wholesale service, or group of wholesale services, to the equivalent Network Element or Combination that is available to TWTC pursuant to Section 251 of the Act and under this Agreement or convert a Network Element or Combination that is available to TWTC pursuant to Section 251 of the Act and under this Agreement to an equivalent wholesale service or group of wholesale services offered by AT&T (collectively “Conversion”). AT&T shall charge the applicable nonrecurring switch-as-is rates for Conversions to specific Network Elements or Combinations found in Exhibit A. AT&T shall also charge the same nonrecurring switch-as-is rates when converting from Network Elements or Combinations. Any rate change resulting from the Conversion will be effective as of the next billing cycle following AT&T’s receipt of a complete and accurate Conversion request from TWTC. A Conversion shall be considered termination for purposes of any volume and/or term commitments and/or grandfathered status between TWTC and AT&T. Any change from a wholesale service/group of wholesale services to a Network Element/Combination, or from a Network Element/Combination to a wholesale service/group of wholesale services, that requires a physical rearrangement will not be considered to be a Conversion for purposes of this Agreement. AT&T will not require physical rearrangements if the Conversion can be completed through record changes only. Orders for Conversions will be handled in accordance with the guidelines set forth in the Ordering Guidelines and Processes and CLEC Information Packages as referenced in Sections 1.14.1 and 1.14.2 below.

  • Out-of-Network Services We Cover the services of Non-Participating Providers. See the Schedule of Benefits section of this Contract for the Non-Participating Provider services that are Covered. In any case where benefits are limited to a certain number of days or visits, such limits apply in the aggregate to in-network and out-of-network services.

  • Network Resource Interconnection Service 4.1.2.1 The Product

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!