Networking and Security Sample Clauses

Networking and Security. CIT4220 Local Area Network Routing & Switching CIT4230 Internetwork Routing and Switching CIT4245 System and Security Administration CIT4270 Linux System and Security Administration Semester Hour Credit CIT4255 Advanced System and Security Administration 4 CIT/ISM3/4xxx ISM3830 Approved Elective Security Computer Forensics 4 4 CIT4260 Disaster Recovery/Virtualization Security and Safety 4 CIT4810 Network Defense 4 CIT4820 Penetration Testing 4 CIT4830 Ethical Hacking 4 CIT/ISM3/4xxx Approved Elective 4 CIT3510 Software Development Object-Oriented Programming with C++ 4 CIT4311 Web Applications 4 CIT4411 Advanced Database Management Systems 4 CIT4531 Software Engineering 4 CIT4595 Enterprise Applications 4 CIT2515 Select one elective from the following: Visual BASIC programming 4 CIT3525 Java Programming ISM4310 Web Design & Development E-Commerce 4 CIT4311 Web Applications 4 CIT4411 Advanced Database Management Systems 4 CIT4425 Database Systems for the Web 4 CIT4595 Enterprise Applications 4 CIT3525 Select one elective from the following: Java Programming 4 CIT4531 Software Engineering Total CIT Specialty Area 24 Area II Liberal Arts Component CAP1000 Computer Applications 4 ENG1101 English Composition 4 POS2050 American National Government 4 PSY1103 Strategic Thinking 3 MAC1132 College Math 4 MAC2102 College Algebra 4 STA3014 Statistics 4 COM3015 Professional Communication 4 PHI3601/3301 Ethics or Philosophy 4 IDS1001 Foundations for College Success 1 IDS4001 The Learning Portfolio 1 One Liberal Arts Elective 1 Total Liberal Arts Component Total Semester Hours for Graduation Requirement 38 122 Table of Contents Name of Institution: Xxxxxx University Academic Year: 2011-2012 Program of Study: CRIMINAL JUSTICE School: Xxxxxxx School of Professional Studies
AutoNDA by SimpleDocs
Networking and Security. Amdocs will manage [***]. This Service will be comprised of [***]. This Service will include [***]. Amdocs will assume full responsibility for the administration and maintenance of [***]. Amdocs will be responsible for [***]. Company will provide and manage the network elements from Company Sites to the production and non-production Disaster Recovery sites. Amdocs will maintain [***] [***] * Confidential treatment has been requested. The redacted material has been separately filed with the Commission. [***] [***]
Networking and Security. Amdocs will manage the Amdocs data center’s access to internet services; the communications facilities between the Amdocs data center and the Disaster Recovery site. This service will be comprised of detailed analysis of network use and management capacity, and provision of additional network links and components. This Service will include the implementation and maintenance of Amdocs internal security policies, and detailed investigation of all network alerts raised by the Amdocs operations team. Amdocs will assume full responsibility for the administration and maintenance of the local area network (“LAN”) within the Data Center. Amdocs will be responsible for all wide area network (“WAN”) connectivity from its operations centers to its development and other operations centers. Amdocs will maintain security components needed to secure the Amdocs production systems in accordance with Schedules B and C, in accordance with the procedures set forth in Schedule Y, including, but not limited to Sprint’s security policies. Amdocs will, at a minimum, supply all security management related to facilities, systems, applications, and data. • Sites Security – Amdocs Sites providing Managed Services are secured with security systems, including access systems, and movement detectors. Only authorized Personnel who have been granted access will be allowed to access the Amdocs Sites and the Amdocs data center itself. Amdocs will maintain the Amdocs Sites security on a 24X7 basis. • Security and Access – Sprint will manage the Sprint Personnel profiles and be responsible for the daily maintenance of these tables. Amdocs will implement this policy for Amdocs Personnel as well. • Data Security – Amdocs will ensure, as part of its Customized Product maintenance obligations, that the access to the Sprint Data is by authorized Personnel only. The proper profiles will be determined and only authorized Personnel from Sprint and/or Amdocs will be allowed to access Sprint Data, in accordance with security policies as set forth in Schedule Y.

Related to Networking and Security

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Monitoring and Reporting 3.1 The Contractor shall provide workforce monitoring data as detailed in paragraph 3.2 of this Schedule 8. A template for data collected in paragraphs 3.2, 3.3 and 3.4 will be provided by the Authority. Completed templates for the Contractor and each Sub-contractor will be submitted by the Contractor with the Diversity and Equality Delivery Plan within six (6) Months of the Commencement Date and annually thereafter. Contractors are required to provide workforce monitoring data for the workforce involved in delivery of the Contract. Data relating to the wider Contractor workforce and wider Sub-contractors workforce would however be well received by the Authority. Contractors and any Sub-contractors are required to submit percentage figures only in response to paragraphs 3.2(a), 3.2(b) and 3.2(c).

  • Training and Education SECTION 1 – Law Enforcement Supervisors’ Training The state and the PBA recognize the importance of supervisor training programs to develop management skills in our law enforcement supervisors. The state will make a reasonable effort to continue existing training programs in law enforcement techniques and to develop new programs in performance review techniques, supervisory skills, and managerial techniques.

  • Collateral and Security Section 10.01

  • FORM AND SECURITY PROCEDURES Proper Instructions may be in writing signed by the authorized individual or individuals or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed to from time to time by the Custodian and the individual or organization giving the instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian including, but not limited to, the security procedures selected by the Fund by reference to the form of Funds Transfer Addendum hereto, the terms of which are part of this Agreement. The Custodian may agree to accept oral instructions, and in such case oral instructions will be considered Proper Instructions. The Fund shall cause all oral instructions to be confirmed in writing, but the Fund’s failure to do so shall not affect the Custodian’s authority to rely on the oral instructions.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!