Security Monitoring and Mitigation Sample Clauses

Security Monitoring and Mitigation. Crown Castle monitors the Edge Device utilized in connection with the Product. Crown Castle does not provide monitoring of security events, any security event mitigation or advice regarding security issues or threats. Upon request by Licensee, Crown Castle will modify the configuration of the Product in accordance with the specifications provided by Licensee to attempt to mitigate security events and security threats identified by Licensee. Crown Castle’s sole obligation is to implement the configuration settings requested by Licensee. Crown Castle makes no guarantees with respect to the detection or blocking of viruses/worm/malware or any other types of attacks, and is not responsible for any malicious data that may be transmitted over the Underlay Product.
AutoNDA by SimpleDocs
Security Monitoring and Mitigation. Crown Castle monitors the Edge Device utilized in connection with the Ethernet Integrated with SD-WAN Product. Crown Castle does not provide monitoring of security events, any security event mitigation or advice regarding security issues or threats. Upon request by Licensee, Crown Castle will modify the configuration of the Ethernet Integrated with SD-WAN Product in accordance with the specifications provided by Licensee to attempt to mitigate security events and security threats identified by Licensee. Crown Castle’s sole obligation is to implement the configuration settings requested by Licensee. Crown Castle makes no guarantees with respect to the detection or blocking of viruses/worms/malware or any other types of attacks, and is not responsible for any malicious data that may be transmitted over the Ethernet Integrated with SD-WAN Product.
Security Monitoring and Mitigation. Company monitors the Edge Device utilized in connection with the Product. Company does not provide monitoring of security events, any security event mitigation or advice regarding security issues or threats. Upon request by Licensee, Company will modify the configuration of the Product in accordance with the specifications provided by Licensee to attempt to mitigate security events and security threats identified by Licensee. Company’s sole obligation is to implement the configuration settings requested by Licensee. Company makes no guarantees with respect to the detection or blocking of viruses/worm/malware or any other types of attacks, and is not responsible for any malicious data that may be transmitted over the Underlay Product.
Security Monitoring and Mitigation. Planet monitors the Edge Device utilized in connection with the Product. Planet does not provide monitoring of security events, any security event mitigation or advice regarding security issues or threats. Upon request by Licensee, Planet will modify the configuration of the Product in accordance with the specifications provided by Licensee to attempt to mitigate security events and security threats identified by Licensee. Planet’s sole obligation is to implement the configuration settings requested by Licensee. Planet makes no guarantees with respect to the detection or blocking of viruses/worm/malware or any other types of attacks, and is not responsible for any malicious data that may be transmitted over the Underlay Product.
Security Monitoring and Mitigation. For the Services, Comcast monitors the equipment. COMCAST DOES NOT PROVIDE MONITORING OF SECURITY EVENTS, ANY SECURITY EVENT MITIGATION, OR ADVICE REGARDING SECURITY ISSUES OR THREATS. Upon request by Customer, Comcast will modify the configuration of the Services in accordance with specifications provided by Customer to attempt to mitigate security events and security threats identified by Customer. Comcast’s sole obligation is to implement the configuration settings requested by Customer. This Service is provided on a commercially reasonable efforts basis only and Comcast makes no guarantees with respect to the detection or blocking of viruses/worm/malware or any other types of attacks and is not responsible for any such malicious data that may be transmitted over the provided network.

Related to Security Monitoring and Mitigation

  • Program Monitoring and Evaluation The Recipient shall prepare, or cause to be prepared, and furnish to the Association not later than six months after the Closing Date, a report of such scope and in such detail as the Association shall reasonably request, on the execution of the Program, the performance by the Recipient and the Association of their respective obligations under the Legal Agreements and the accomplishment of the purposes of the Financing.”

  • Reporting and Monitoring Please provide a brief description of the mechanisms proposed for this project for reporting to the UNDP and partners, including a reporting schedule.

  • Monitoring and Review The Provider agrees to allow access to the Department for purposes of monitoring and review. This access includes but is not limited to client records, fiscal records, staffing records, policy and procedural manuals, facilities, staff, and children in care of the Department. The Department will conduct quality reviews, which may include site-based quality review visits.

  • Evaluation, Testing, and Monitoring 1. The System Agency may review, test, evaluate and monitor Grantee’s Products and services, as well as associated documentation and technical support for compliance with the Accessibility Standards. Review, testing, evaluation and monitoring may be conducted before and after the award of a contract. Testing and monitoring may include user acceptance testing. Neither the review, testing (including acceptance testing), evaluation or monitoring of any Product or service, nor the absence of review, testing, evaluation or monitoring, will result in a waiver of the State’s right to contest the Grantee’s assertion of compliance with the Accessibility Standards. 2. Grantee agrees to cooperate fully and provide the System Agency and its representatives timely access to Products, records, and other items and information needed to conduct such review, evaluation, testing, and monitoring.

  • Project Monitoring Reporting and Evaluation The Recipient shall furnish to the Association each Project Report not later than forty-five (45) days after the end of each calendar semester, covering the calendar semester.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!