Protective Controls Sample Clauses

Protective Controls. Either Party may use protective network traffic management controls such as 7-digit or 10-digit code gaps, as applicable, on traffic towards each Party’s network, when required to protect the public switched network from congestion or failure, or focused overload. Midcontinent and ILEC will immediately notify each other of any protective control action planned or executed.
Protective Controls. Any Party may use or request protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic to or from each other’s network, when required to protect the public switched network from congestion due to Facility failures, switch congestion, or failure or focused overload. The Parties will immediately notify each other of any protective control action planned or executed.
Protective Controls. Either Party may use protective network traffic management controls such as 3, 7, and 10 digit code gaps on traffic toward each other's network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. PFN and AT&T MICHIGAN shall immediately notify each other of any protective control action planned or executed.
Protective Controls. Either Party may use protective network traffic management controls as available in their networks such as, but not limited to, 7-digit and 10-digit code gaps, on traffic toward each other's network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. CLC and FairPoint will immediately notify each other of any protective control action planned or executed.

Related to Protective Controls

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Internal Controls The Company shall maintain a system of internal accounting controls sufficient to provide reasonable assurances that: (i) transactions are executed in accordance with management’s general or specific authorization; (ii) transactions are recorded as necessary in order to permit preparation of financial statements in accordance with GAAP and to maintain accountability for assets; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with existing assets at reasonable intervals and appropriate action is taken with respect to any differences.