Physical Layer – Network Sample Clauses

Physical Layer – Network. Perimeter protection is implemented through the use of controlled devices at the network edge and on points throughout the network. The overarching principle of Xxxxxxx’x network security is to allow only connections and communications that are necessary to allow systems to operate, blocking other ports, protocols and connections. Access control lists (ACLs) implemented in the form of tiered ACLs on routers, firewall rules and host based firewall rules are implemented in the network with restrictions on network communication, protocols, and port numbers. Xxxxxxx uses edge router security for monitoring at the network layer. Networks within Xxxxxxx’x datacenter are further segmented to provide physical separation of critical back-end servers and storage devices from the public-facing interfaces. Xxxxxxx retains system logs for auditing and review.
AutoNDA by SimpleDocs
Physical Layer – Network. Perimeter protection is implemented through the use of controlled devices at the network edge and on points throughout the network. The overarching principle of Raymond’s network security is to allow only connections and communications that are necessary to allow systems to operate, blocking other ports, protocols and connections. Access control lists (ACLs) implemented in the form of tiered ACLs on routers, firewall rules and host based firewall rules are implemented in the network with restrictions on network communication, protocols, and port numbers. Xxxxxxx uses edge router security for monitoring at the network layer. Networks within Raymond’s datacenter are further segmented to provide physical separation of critical back-end servers and storage devices from the public-facing interfaces. Xxxxxxx retains system logs for auditing and review.

Related to Physical Layer – Network

  • Data Location 1.1. The CONTRACTOR shall not store or transfer non-public COUNTY data outside of the United States. This includes backup data and Disaster Recovery locations. The CONTRACTOR will permit its personnel and contractors to access COUNTY data remotely only as required to provide technical support. (Remote access to data from outside the continental United States is prohibited unless approved in advance and in writing by the County.)

  • MOBILE DATA COMPUTERS 23 1. As part of the law enforcement services to be provided to CITY, COUNTY 24 has provided, or will provide, mobile data computers (hereinafter called 25 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 26 designated by COUNTY for use within CITY limits.

  • ODUF Physical File Characteristics 6.2.1 ODUF will be distributed to Image Access via Secure File Transfer Protocol (FTP). The ODUF feed will be a variable block format. The data on the ODUF feed will be in a non-compacted EMI format (one hundred seventy-five (175) byte format plus modules). It will be created on a daily basis Monday through Friday except holidays. Details such as dataset name and delivery schedule will be addressed during negotiations of the distribution medium. There will be a maximum of one (1) dataset per workday per OCN. If BellSouth determines the Secure FTP Mailbox is nearing capacity levels, BellSouth may move the customer to CONNECT:Direct file delivery.

  • Physical Exams The Employer agrees to provide without cost to employees, physical examinations and/or other appropriate tests when such tests are deemed necessary by management to determine whether the health of employees is being or has been adversely affected by exposure to potentially harmful physical agents, toxic materials, or infectious agents, or by attacks and assaults. The Employer agrees to provide to each affected employee who requests it a complete and accurate written report of any such medical examination or other appropriate tests related to occupational exposure. Additionally, written results of an industrial hygiene measurements or investigations related to an employee's occupational exposure will also be provided, upon request, to the employee or the employee's authorized representative. The Union and/or members of the applicable Health and Safety Committee will be provided copies of summary reports, but such reports will not contain personally identifying information.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.