Networks & Transmission Sample Clauses

Networks & Transmission i. Data Transmission. Data centers are typically connected via high-speed private links to provide secure and fast data transfer between data centers. Google transfers all Customer Data via Internet standard protocols.
AutoNDA by SimpleDocs
Networks & Transmission. (a) Data Transmission. Transmissions between data centers are designed to prevent data from being read, copied, altered or removed without authorization during electronic transfer or transport or while being recorded onto data storage media. Processor transfers data via Internet standard protocols.
Networks & Transmission. Data Transmission. The datacenters are typically connected via high-speed private links to provide secure and fast data transfer. This is designed to prevent data from being read, copied, altered or removed without authorization during electronic transfer or transport or while being recorded onto data storage media. Xxxxx transfers data via Internet standard protocols. External Attack Surface. Xxxxx employs multiple layers of network devices and intrusion detection to protect its external attack surface. Xxxxx considers potential attack vectors and incorporates appropriate purpose built technologies into external facing systems. Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Xxxxx intrusion detection involves: Tightly controlling the size and make-up of Xxxxx’x attack surface through preventative measures; employing Incident Response. Xxxxx monitors a variety of communication channels for security incidents, and Xxxxx’x security personnel will react promptly to known incidents. Encryption Technologies. Xxxxx utilizes HTTPS encryption (also referred to as SSL or TLS) on its production and testing environments.
Networks & Transmission. 1.2.1. Data Transmission. Fastpool transfers data via Internet standard protocols.
Networks & Transmission. Data Transmission. Data centers are typically connected via high-speed private links to provide secure and fast data transfer between data centers. This is designed to prevent data from being read, copied, altered or removed without authorization during electronic transfer or transport or while being recorded onto data storage media. The Data Importer transfers data via Internet standard protocols. External Attack Surface. The Data Importer employs multiple layers of network devices and intrusion detection to protect its external attack surface. The Data Importer considers potential attack vectors and incorporates appropriate purpose-built technologies into external facing systems. Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. The Data Importer intrusion detection involves: 1. Tightly controlling the size and make-up of the Data Importer's attack surface through preventative measures;

Related to Networks & Transmission

  • Information Transmission The Provider, on behalf of itself and its respective Subsidiaries, shall use commercially reasonable efforts to provide or make available, or cause to be provided or made available, to the Recipient, in accordance with Section 6.1 of the Separation and Distribution Agreement, any Information received or computed by the Provider for the benefit of the Recipient concerning the relevant Service during the Service Period; provided, however, that, except as otherwise agreed to in writing by the Parties (a) the Provider shall not have any obligation to provide, or cause to be provided, Information in any non-standard format, (b) the Provider and its Subsidiaries shall be reimbursed for their reasonable costs in accordance with Section 6.3 of the Separation and Distribution Agreement for creating, gathering, copying, transporting and otherwise providing such Information, and (c) the Provider shall use commercially reasonable efforts to maintain any such Information in accordance with Section 6.4 of the Separation and Distribution Agreement.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • Facsimile Transmission When sent by fax to the last fax number of the recipient known to the party giving notice, notice is effective upon receipt, provided that: a) a duplicate copy of the notice is promptly given by first class mail or certified mail or by overnight delivery, or b) the receiving party delivers a written confirmation of receipt. Any notice given by fax shall be deemed received on the next business day if received after 5:00

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers).

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Telecommunications Services The offering of telecommunications for a fee directly to the public, or to such classes of users as to be effectively available directly to the public, regardless of the facilities used.

  • Errors in Transmission By using the Services you accept the risk that an item may be intercepted or misdirected during transmission. The Bank bears no liability to you or others for any such intercepted or misdirected items or information disclosed through such errors.

  • Transmission of business Where a business is transmitted from one employer to another, as set out in clause 4.4 - Redundancy, the period of continuous service that the employee had with the transmittor or any prior transmittor is deemed to be service with the transmittee and taken into account when calculating notice of termination. However, an employee shall not be entitled to notice of termination or payment in lieu of notice for any period of continuous service in respect of which notice has already been given or paid for.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!