Security Contacts Sample Clauses

Security Contacts. DISA Security Personnel can be contacted for Industrial or Personnel Security related issues at (000) 000-0000 or via mail at:
AutoNDA by SimpleDocs
Security Contacts. The following individuals shall be the primary contacts for purposes of any coordination, communications or notices with respect to this Schedule, or any Security Breach: (a) Service Provider’s Security Coordinator contact information: [Name], [Title], [Phone], [E-mail] (b) Customer’s information security contact: [INSERT APPROPRIATE SECURITY CONTACT OR CONTACT POINT]
Security Contacts. The initial contacts in respect of Security issues shall be: 6.1. Parent Security Contact Name: [***] Group Alias/Distribution List: [***] Email: [***] Phone: [***] 6.2. Company Security Contact
Security Contacts. DISA Security Personnel can be contacted for Industrial or Personnel Security related issues at (000) 000-0000 or via mail at: Defense Information Systems Agency Defense Information Systems Agency ATTN: MP61, Industrial Security ATTN: MP62, Personnel Security Command Building Command Building 0000 Xxxxxx Xxx. 0000 Xxxxxx Xxx. Fort Xxxxx, MD 20755-7088 Fort Xxxxx, MD 20755-7088 For Center or Directorate-specific security related matters, contact the Directorate or Center Security Manager at: Name: Xxxxxxx Xxxxxx Phone: (000) 000-0000 E-mail: xxxxxxx.xxxxxx00.xxx@xxxx.xxx
Security Contacts. The following individuals shall be the primary contacts for purposes of any coordination, communications or notices with respect to this Schedule, or any Security Breach: (a) Agency’s Security Coordinator contact information: Name Title Phone E-mail (b) AIG’ security contact: Xxxx Xxxxx, Manager CRTC Technical Architecture, +00 (0)000 000 0000, xxxx.xxxxx@XXXxxxxxxxxx.xxx Copy to: Xxxxxxx Xxxxxxxxx Xxx, CRTC Technical Architecture, +00 (0)00 0000 0000, xxxxxxxx@XXXxxxxxxxxx.xxx Each party shall promptly notify the other if any of the foregoing contact information changes.
Security Contacts. The following individuals shall be the primary contacts for purposes of any coordination, communications or notices with respect to this Schedule, or any Security Breach: (a) Service Provider’s Security Coordinator contact information: Xxxx X. Xxxxx, Senior Vice President (ph: 000-000-0000; email: xxxxxx@xxxxxxx.xxx) (b) Customer’s information security contact: xxx.xxxxxxxxxxxxxxxx@xxx.xxx; 000-000-0000 Each party shall promptly notify the other if any of the foregoing contact information changes. PORTIONS OF THIS EXHIBIT WERE OMITTED AND HAVE BEEN FILED SEPARATELY WITH THE SECRETARY OF THE COMMISSION PURSUANT TO AN APPLICATION FOR CONFIDENTIAL TREATMENT UNDER RULE 24B-2 OF THE SECURITIES EXCHANGE ACT; [***] DENOTES OMISSIONS

Related to Security Contacts

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Security Coordinator Provider shall provide the name and contact information of Provider’s Security Coordinator for the Student Data received pursuant to the DPA.

  • Primary Contacts The Parties will keep and maintain current at all times a primary point of contact for this contract. The primary contacts for this this Contract are as follows:

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Authorized Contacts LightEdge Solutions provides reliable and secure managed services by requiring technical support and information requests come only from documented, authorized client-organization contacts. Additionally, in compliance with federally regulated CPNI (Customer Proprietary Network Information) rules, a customer contacting LightEdge Solutions to request an add, move, or change and/or to request information on their account, must provide LightEdge representative with customer’s Code Word. Code Word is not required or verified to open trouble tickets related to service issues, however, any subsequent information/updates or authorization of intrusive testing related to the trouble ticket will require the Code Word. Customer shall provide a “contact list” which will contain one (“1”) Administrative contact and may contain up to three (“3”) Technical contacts per service. Administrative and Technical contacts are authorized to request service changes or information, including the contact name, contact e-mail address and contact phone number for each contact but must provide customer Code Word for any CPNI related requests. Requests to change a contact on the list or to change the Code Word must be submitted by the Administrative contact. Requests to replace the Administrative contact shall be submitted via fax to LightEdge on customer company letterhead. All requests are verified per procedure below.  Requests for CPNI, configuration information or changes are accepted only from documented, authorized client-organization contacts via e-mail, fax or phone and will require Customer’s Code Word. E-mail and fax requests must be submitted without the Code Word. Customer contact will be called to verify Code Word. E- mail requests that include the Code Word will be denied and the client Administrative Contact will be notified and required to change the Code Word.  E-mail and fax requests are verified with a phone call to the documented client contact. Phone call requests must be validated with an e-mail request from a documented client contact.

  • Operational Contacts Each Interconnection Party shall designate, and provide to each other Interconnection Party contact information concerning, a representative to be responsible for addressing and resolving operational issues as they arise during the term of the Interconnection Service Agreement.

  • POINTS OF CONTACT The following personnel are designated as the Points of Contact between the Parties in the performance of this Annex.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!