Network and System Security Sample Clauses

Network and System Security. The Client is prohibited from violating, or attempting to violate system or network security. Any violations may result in criminal or civil liability to the Client. Access Alto will investigate any alleged violations and will cooperate with law enforcement agencies if a criminal violation is suspected. Examples of system or network violations include, but are not limited to: 2.1. Unauthorised monitoring or access to or use of data, networks or systems, including any attempt to probe, scan or test the vulnerability of a network and or system or to breach security or authentication measures without proper authorisation; and 2.2. interference with, or disrupting or disabling service to any user, host or network via means including, but not limited to, "overloading", "flooding", "mail-bombing", "denial of service attacks" or "crashing"; and 2.3. sending, storage, or distribution of viruses, worms, Trojans, or other malware component harmful to a network or system; and 2.4. forging any TCP/IP packet header or any part of an email header or newsgroup posting; and 2.5. attempts to circumvent or alter any method of measuring or billing for the Service.
AutoNDA by SimpleDocs
Network and System Security. The Client is prohibited from violating or attempting to violate system or network security. Any violations may result in criminal or civil liability to the Client. DBTS will investigate any alleged violations and will cooperate with law enforcement agencies if a criminal violation is suspected.
Network and System Security. Third Party/Supplier must have, at a minimum, the following network and system security controls in place when Third Party/Supplier has Information belonging to or entrusted to Lilly that resides outside Lilly’s environment and/or when the Third Party/Supplier has a remote access connection to Xxxxx’x environment: a. Hardening standards for operating systems, applications, and network devices. b. All systems must be patched for operating system and major component updates upon security related patch release and evaluation in accordance with common security standards (e.g., ISO, NIST). o High risk vulnerabilities for internet facing applications must be patched within 7 days. c. Systems must be maintained at levels to allow the latest security patches/service packs to be applied. Network Security Controls: a. Information belonging to or entrusted to Lilly must not be stored in a demilitarized zone (DMZ). b. Firewall policies must be implemented on all networks interfaces that restrict inbound and outbound traffic based on need. c. Intrusion detection or intrusion prevention systems must be implemented to detect and respond to unauthorized or malicious network traffic. d. The Third Party/Supplier must update the security configuration of its network devices in accordance with this Section 5. e. If an availability service level agreement exists on a system or application between Lilly and Third Party/Supplier, Distributed Denial of Access (DDoS) protection is in place. Systems Security Controls: a. Endpoint devices must be encrypted and secured with a password. b. Mobile endpoints (smartphones, tablets) must be secured using a mobile device management system. c. Servers and endpoints must be secured using virus/malware protection that are kept up to date.

Related to Network and System Security

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Provisional Interconnection Service Upon the request of Interconnection Customer, and prior to completion of requisite Interconnection Facilities, Network Upgrades, Local Upgrades, or system protection facilities Interconnection Customer may request limited Interconnection Service at the discretion of Transmission Provider based upon an evaluation that will consider the results of available studies, which terms shall be memorialized in the Interconnection Service Agreement. Consistent with Tariff, Part VI, Subpart B, section 212.4, Interconnection Customer may execute the Interconnection Service Agreement, request dispute resolution or request that the Interconnection Service Agreement be filed unexecuted with the Commission. Transmission Provider shall determine, through available studies or additional studies as necessary, whether stability, short circuit, thermal, and/or voltage issues would arise if Interconnection Customer interconnects without modifications to the Generating Facility or the Transmission System. Transmission Provider shall determine whether any Interconnection Facilities, Network Upgrades, Local Upgrades, or system protection facilities that are necessary to meet the requirements of NERC, or any applicable Regional Entity for the interconnection of a new, modified and/or expanded Generating Facility are in place prior to the commencement of Interconnection Service from the Generating Facility. Where available studies indicate that such Interconnection Facilities, Network Upgrades, Local Upgrades, and/or system protection facilities that are required for the interconnection of a new, modified and/or expanded Generating Facility are not currently in place, Transmission Provider will perform a study, at the Interconnection Customer’s expense, to confirm the facilities that are required for Provisional Interconnection Service. The maximum permissible output of the Generating Facility shall be studied and updated annually and at the Interconnection Customer’s expense. The results will be communicated to the Interconnection Customer in writing upon completion of the study. Interconnection Customer assumes all risk and liabilities with respect to the Provisional Interconnection Service, including changes in output limits and Interconnection Facilities, Network Upgrades, Local Upgrades, and/or system protection facilities cost responsibilities.

  • Unbundled Network Elements 35.4.1. The charges that CLEC shall pay to Sprint for Unbundled Network Elements are set forth in Table One of this Agreement. 35.5. Collocation 35.5.1. The charges that CLEC shall pay to Sprint for Collocation are set forth in Table Two of this Agreement. 35.6. Call Related Databases 6.1. The charges that CLEC shall pay to Sprint for Call Related Databases purchased pursuant to Part J are set forth in Table One of this Agreement.

  • Interconnection Service Interconnection Service allows the Interconnection Customer to connect the Large Generating Facility to the Participating TO’s Transmission System and be eligible to deliver the Large Generating Facility’s output using the available capacity of the CAISO Controlled Grid. To the extent the Interconnection Customer wants to receive Interconnection Service, the Participating TO shall construct facilities identified in Appendices A and C that the Participating TO is responsible to construct.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!