Network Design. Nothing in this Agreement requires Licensee to build to all areas of City, and Licensee retains the discretion to determine the scope, location, and timing of the design and construction of the Network.
Network Design. The Data Importer has controls to avoid individuals assuming access rights they have not been assigned to gain access to customer data they are not authorized to access.
Network Design. Microsoft has controls to avoid individuals assuming access rights they have not been assigned to gain access to Customer Data they are not authorized to access.
Network Design a. Acuity has controls to avoid individuals assuming access rights they have not been assigned to gain access to Customer Data they are not authorized to access.
Network Design. For systems that process Protected Data, Cisco shall have controls to avoid per- sonnel assuming access rights beyond those that they have been assigned to gain unauthorized ac- cess to Protected Data.
Network Design. In developing the Preliminary City Network Design, Contractor shall use Contractor-provided coverage prediction tools, such as the satellite blockage tool and a microcell model for use in the Manhattan design.
Network Design. For systems that process Personal Data, Cisco shall have controls to avoid personnel assuming access rights beyond those that they have been assigned to gain unauthorized access to Personal Data.
Network Design. For systems that process Data, Vertice shall have controls to avoid Representatives assuming access rights that could be used to gain unauthorised access to Data.
Network Design. Upon completion of the field survey, Telematics team will perform the System Network design. As a result of this design, a primary deployment map and a list of sites according to priorities will be performed by Telematics team and provided to the Buyer for location of the appropriate sites.
Network Design. For systems that process Protected Data, Supplier shall have controls to avoid personnel assuming access rights beyond those that they have been assigned to gain unauthor- ized access to Protected Data.