Shutdown of Infection Points, Drop Sites, or Command and Control Points Sample Clauses

Shutdown of Infection Points, Drop Sites, or Command and Control Points. (a) RSA will analyze Infection Points, Drop Sites, Update Points, or Command and Control Points and seek to identify the operator of the hosting website and/or their respective Internet Service Providers (“ISP(s)”).
AutoNDA by SimpleDocs

Related to Shutdown of Infection Points, Drop Sites, or Command and Control Points

  • FACILITY OPERATIONS FACILITY OPERATION MON TUES WED THURS FRI SAT SUN A. Regular hours facility is open to public and employees 10A -9P 10A -9P 10A -9P 10A -9P 10A -5P 10A -5P Closed B. Hours facility is open to public and employees

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Generating Facility The Interconnection Customer’s device for the production of electricity identified in the Interconnection Request, but shall not include the Interconnection Customer’s Interconnection Facilities.

  • Required Coverages For Generation Resources Of 20 Megawatts Or Less Each Constructing Entity shall maintain the types of insurance as described in section 11.1 paragraphs (a) through (e) above in an amount sufficient to insure against all reasonably foreseeable direct liabilities given the size and nature of the generating equipment being interconnected, the interconnection itself, and the characteristics of the system to which the interconnection is made. Additional insurance may be required by the Interconnection Customer, as a function of owning and operating a Generating Facility. All insurance shall be procured from insurance companies rated “A-,” VII or better by AM Best and authorized to do business in a state or states in which the Interconnection Facilities are located. Failure to maintain required insurance shall be a Breach of the Interconnection Construction Service Agreement.

  • Demarcation Point 98.1 CenturyLink will designate the point of demarcation between CenturyLink’s equipment and CLEC’s collocated equipment, which point of demarcation shall be in or adjacent to its Collocation Space unless otherwise mutually agreed to by the Parties. At CLEC's request, CenturyLink will identify the location(s) of other possible demarcation points available to CLEC, and CLEC will designate from these location(s) the point(s) of demarcation between its collocated equipment and CenturyLink's equipment. CenturyLink will use its best efforts to identify the closest demarcation point to CLEC's equipment that is available.

  • Direct Trunked Transport 7.3.2.1 Either Party may elect to purchase direct trunked transport from the other Party.

  • Interconnection Points 8.5.1 The IP of a Party (“Receiving Party”) for Measured Internet Traffic delivered to the Receiving Party by the other Party shall be the same as the IP of the Receiving Party for Reciprocal Compensation Traffic under Section 7.1 above.

  • Contact Points 1. Each Party shall designate a contact point to facilitate communications between the Parties on any matter covered by this Agreement. 2. Upon request of the other Party, the contact point shall identify the office or official responsible for the matter and assist, as necessary, in facilitating communication with the requesting Party. Contact points shall work jointly to develop agendas and make other preparations for the Free Trade Commission meetings and follow-up on the Free Trade Commission's decisions as appropriate; provide administrative support to the Panels established under Chapter 15 (Dispute Settlement) and address any other matter entrusted by the Free Trade Commission.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Time is Money Join Law Insider Premium to draft better contracts faster.