Protective Protocols Sample Clauses

Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each other’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. CLEC and Sprint will immediately notify each other of any protective control action planned or executed.
AutoNDA by SimpleDocs
Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each others network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. The Parties will immediately notify each other of any protective control action planned or executed.
Protective Protocols. 5.1.1 Either party may se protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each others network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. MCIm and BellSouth will immediately notify each other of any protective control action planned or executed.
Protective Protocols. All traffic between users and the application occurs over HTTPS with TLS 1.2 • Connections between application and database are encrypted using TLS • Application servers, database servers exist in a private virtual networkNetwork Security groups are used to restrict access to application/database servers • IAM policies are used to limit employee access to cloud computing resources • OS Security patches are installed in a timely manner • AWS GuardDuty is used to detect anomalous cloud account activity • Data is encrypted in transit and at rest at a minimum of 128-bit AES • Annual training for employees and contracted personnel, covering: - FERPA law overview _ - COPPA law overview - State-specific requirements - Data security incident plans - Cybersecurity - How to handle requests for data access/erasure - How to verify identity for requests relating to customer data - SmartMusic privacy policy responsibilities • Please also see: xxxxx://xxx.xxxxxxxxx.xxx/privacy/ Upon expiration of the agreement, data may be securely destroyed or transferred, per and upon request from the EA, in a reasonable and agreed upon timeframe. Reporting and Contact The following process will be followed when responding to a suspected incident: 1.Confirmed or suspected incidents shall be reported promptly to MakeMusic's engineering management at xxxxxxx@xxxxxxxxx.xxx or xxxxx@xxxxxxxxx.xxx. A report will be filed that includes detailed information about the incident including team members involved, timelines, and data involved.
Protective Protocols. All traffic between users and the application occurs over HTTPS with TLS 1.2. • Connections between application and database are encrypted using TLS. • Application servers, database servers exist in a private virtual network. • Network Security groups are used to restrict access to application/database servers. • IAM policies are used to limit employee access to cloud computing resources. • OS Security patches are installed in a timely manner. • AWS GuardDuty is used to detect anomalous cloud account activity. • Data is encrypted in transit and at rest at a minimum of 128-bit AES. • Maintain a Data Incidence Response Plan which aligns with the NIST Cybersecurity Framework v1.1. • Adopted practices and procedures which align with applicable NIST principles and industry- standard practices. • Annual training for employees and contracted personnel, covering: - FERPA law overview - COPPA law overview - Cybersecurity and best practices - State-specific requirements (as applicable) - Data security incident plans (for relevant employees) - How to handle requests for data access/erasure (for relevant employees) - How to verify identity for requests relating to customer data (for relevant employees) Upon expiration of an agreement or termination of use, data may be securely destroyed or transferred, per and upon request from the EA or customer, barring any legal obligations. The following process will be followed when responding to a suspected incident:
Protective Protocols. Either Party may use protective network traffic management controls such as 3, 7, and 10 digit network controls on traffic toward each other’s network, when required to protect the public switched network from congestion due to facility failures, Switch congestion or failure, or focused overload. MCIm and Verizon shall promptly notify each other of any significant protective control action executed.

Related to Protective Protocols

  • Protective Measures We have implemented and will maintain appropriate technical and organisational measures in relation to the Services taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of Processing, as well as the likelihood and severity of risk to the rights and freedoms of data subjects. This includes measures relating to the physical security of Our facilities used to deliver them, measures to control access rights to Our assets and relevant networks, and processes for testing these measures. In accordance with Our obligations under applicable law, We may undertake digital forensic investigations in relation to the use of the Services and Subscriptions. You are responsible for using, and ensuring that your Users use, the controls and advice provided by the Services correctly and consistently.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Medical Procedures 21.01 The Board shall distribute a copy of its Operating Procedures for administration of prescribed medication to pupils in schools and Procedures for health support services to each Teacher. 21.02 In accordance with Operating Procedure Special Education Services 8, a Teacher may refuse without prejudice a request to administer medications except in life-threatening situations.

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!