Physical Layer – Network Sample Clauses

Physical Layer – Network. Perimeter protection is implemented through the use of controlled devices at the network edge and on points throughout the network. The overarching principle of Xxxxxxx’x network security is to allow only connections and communications that are necessary to allow systems to operate, blocking other ports, protocols and connections. Access control lists (ACLs) implemented in the form of tiered ACLs on routers, firewall rules and host based firewall rules are implemented in the network with restrictions on network communication, protocols, and port numbers. Xxxxxxx uses edge router security for monitoring at the network layer. Networks within Xxxxxxx’x datacenter are further segmented to provide physical separation of critical back-end servers and storage devices from the public-facing interfaces. Xxxxxxx retains system logs for auditing and review.
AutoNDA by SimpleDocs
Physical Layer – Network. Perimeter protection is implemented through the use of controlled devices at the network edge and on points throughout the network. The overarching principle of Raymond’s network security is to allow only connections and communications that are necessary to allow systems to operate, blocking other ports, protocols and connections. Access control lists (ACLs) implemented in the form of tiered ACLs on routers, firewall rules and host based firewall rules are implemented in the network with restrictions on network communication, protocols, and port numbers. Xxxxxxx uses edge router security for monitoring at the network layer. Networks within Raymond’s datacenter are further segmented to provide physical separation of critical back-end servers and storage devices from the public-facing interfaces. Xxxxxxx retains system logs for auditing and review.

Related to Physical Layer – Network

  • Data Location 1.1. The CONTRACTOR shall not store or transfer non-public COUNTY data outside of the United States. This includes backup data and Disaster Recovery locations. The CONTRACTOR will permit its personnel and contractors to access COUNTY data remotely only as required to provide technical support. (Remote access to data from outside the continental United States is prohibited unless approved in advance and in writing by the County.) 1.2. The CONTRACTOR must notify the COUNTY in advance and in writing of any location changes to CONTRACTOR’s data center(s) that will process or store County data.

  • NON-NETWORK PROVIDER is a provider that has not entered into a contract with us or any other Blue Cross and Blue Shield plan. For pediatric dental care services, non-network provider is a dentist that has not entered into a contract with us or does not participate in the Dental Coast to Coast Network. For pediatric vision hardware services, a non-network provider is a provider that has not entered into a contract with EyeMed, our vision care service manager.

  • Provider Network The Panel of health service Providers with which the Contractor contracts for the provision of covered services to Members and Out-of-network Providers administering services to Members.

  • COVID-19 Vaccine Passports Pursuant to Texas Health and Safety Code, Section 161.0085(c), Contractor certifies that it does not require its customers to provide any documentation certifying the customer’s COVID-19 vaccination or post-transmission recovery on entry to, to gain access to, or to receive service from the Contractor’s business. Contractor acknowledges that such a vaccine or recovery requirement would make Contractor ineligible for a state-funded contract.

  • Physical Exams The Employer agrees to provide without cost to employees, physical examinations and/or other appropriate tests when such tests are deemed necessary by management to determine whether the health of employees is being or has been adversely affected by exposure to potentially harmful physical agents, toxic materials, or infectious agents, or by attacks and assaults. The Employer agrees to provide to each affected employee who requests it a complete and accurate written report of any such medical examination or other appropriate tests related to occupational exposure. Additionally, written results of an industrial hygiene measurements or investigations related to an employee's occupational exposure will also be provided, upon request, to the employee or the employee's authorized representative. The Union and/or members of the applicable Health and Safety Committee will be provided copies of summary reports, but such reports will not contain personally identifying information.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!