Preventing Improper Use and Unauthorized Logical Access Sample Clauses

Preventing Improper Use and Unauthorized Logical Access. 1. Edge USA will take practicable measures to prevent unauthorized logical Access to Wet Infrastructure and DCI in the PLCN System used exclusively for the U.S.- Philippines Segment, and to prevent any unlawful use or disclosure of information while carried on the same, including Domestic Communications, and Edge USA will include these measures in the policies that it develops and implements pursuant to this NSA. For purposes of this Section, “practicable measures,” at a minimum, includes measures equal, comparable, or superior to generally recognized industry standards governing cybersecurity, information security, and privacy and will be measured consistent with best practices and guidelines, such as but not limited to the Cybersecurity Framework of the National Institute of Standards and Technology and 27001 Series Standards of the International Organization for Standardization. These practicable measures should also include items such as configuration management, security audits, and system interconnection documentation, as well as contractual safeguards and screening procedures for personnel with logical Access to the DCI. 2. Edge USA will take appropriate measures to protect and promote resiliency of the U.S.-Philippines Segment, including measures to ensure that security patches for systems and applications are up to date. 3. Edge USA will maintain or exceed security standards and best practices utilized within the U.S. telecommunications industry for maintenance of password systems and firewalls, monitoring and oversight of logical Access to the U.S.-Philippines Segment, adequate maintenance of logical Access logs, and periodic internal audits of network security and associated network devices. Edge USA agrees that its security standards and practices for PLCN will also include, among other things, policies or plans relating to its information security, supply chain security, cybersecurity incident response, remote Access, cybersecurity, third-party contractors, outsourcing and offshoring, maintenance and retention of system logs, protection of lawful U.S. process, protection of U.S. Records obtained by Edge USA in the ordinary course of business, and Edge USA’s plans regarding new contracts or amendments to existing contracts with third-party providers requiring those third parties to notify Edge USA in the event of a breach or loss of U.S. Records within a specified time period after discovery, not to exceed 72 hours from the time of discovery, u...
AutoNDA by SimpleDocs
Preventing Improper Use and Unauthorized Logical Access. 1. GU Holdings will take practicable measures to prevent unauthorized logical Access to the PLCN System; Wet Infrastructure; and DCI used in the U.S.-Taiwan Segment, and to prevent any unlawful use or disclosure of information while carried on the same, including Domestic Communications, and GU Holdings will include these measures in the policies that it develops and implements pursuant to this NSA. For purposes of this Section, “practicable measures,” at a minimum, includes measures equal, comparable, or superior to generally recognized industry standards governing cybersecurity, information security, and privacy and will be measured consistent with best practices and guidelines, such as but not limited to the Cybersecurity Framework of the National Institute of Standards and Technology and 27001 Series Standards of the International Organization for Standardization. These practicable measures should also include items such as configuration management, security audits, and system interconnection documentation, as well as contractual safeguards and screening procedures for personnel with logical Access to the DCI. 2. GU Holdings will take appropriate measures to protect and promote resiliency of PLCN, including measures to ensure that security patches for systems and applications are up to date. 3. GU Holdings will maintain or exceed security standards and best practices utilized within the U.S. telecommunications industry for maintenance of password systems and firewalls, monitoring and oversight of logical Access to PLCN, adequate maintenance of logical Access logs, and periodic internal audits of network security and associated network devices. GU Holdings agrees that its security standards and practices for PLCN will also include, among other things, policies or plans relating to its information security, supply chain security, cybersecurity incident response, remote Access, cybersecurity, third-party contractors, outsourcing and offshoring, maintenance and retention of system logs, protection of lawful U.S. process, protection of U.S. Records obtained by GU Holdings in the ordinary course of business, and GU Holdings’ plans regarding new contracts or amendments to existing contracts with third-party providers requiring those third parties to notify GU Holdings in the event of a breach or loss of U.S. Records within a specified time period after discovery, not to exceed 72 hours from the time of discovery, unless the CMAs grant a waiver. 4. Within 60 d...

Related to Preventing Improper Use and Unauthorized Logical Access

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract. a. The contractor shall notify all potential subcontractors and suppliers and lessors of their EEO obligations under this contract. b. The contractor will use good faith efforts to ensure subcontractor compliance with their EEO obligations.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • No Improper Use of Materials During his or her employment with the Company, Employee will not improperly use or disclose any Confidential Information or trade secrets, if any, of any former employer or any other person to whom Employee has an obligation of confidentiality, and Employee will not bring onto the premises of the Company any unpublished documents or any property belonging to any former employer or any other person to whom Employee has an obligation of confidentiality unless consented to in writing by that former employer or person.

  • CERTIFICATION OF NO ASBESTOS CONTAINING MATERIALS OR WORK 8.1 The Contractor shall be responsible for ensuring that no asbestos containing materials or work is included within the scope of the Work. The Contractor shall take whatever measures it deems necessary to insure that all employees, suppliers, fabricators, material men, subcontractors, or their assigns, comply with this requirement. 8.2 The Contractor shall ensure that Texas Department of Health licensed individuals, consultants or companies are used for any required asbestos work including asbestos inspection, asbestos abatement plans/specifications, asbestos abatement, asbestos project management and third-party asbestos monitoring.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code. (b) Unless and until the Bank receives such written notice of disclosure, the Account Holder shall be fully liable and be bound by all transactions effected by the use of such TBS, with or without his consent or knowledge.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!