SYSTEM AND NETWORK Sample Clauses

SYSTEM AND NETWORK o Introduction of malicious programs into the network or Server (e.g. viruses, worms, Trojan horses, etc.). o Attempted or successful security breaches or disruption of Internet communication. Security breaches include, but are not limited to, accessing data of which Client is not an intended recipient or logging into a Server or account that Client is not expressly authorized to access. o Client may not execute any form of network monitoring (e.g. packet sniffer) which will intercept data not intended for Client Server. o Attempts to circumvent Client authentication or security of any host, network, or account ("cracking"). o Attempts to interfere with or deny service to any user or any host (e.g. Denial of Service Attacks). o Use of any program/script/command, or sending messages of any kind, designed to interfere with a third party Clients terminal session, via any means, locally or via the Internet. BILLING o Furnishing false or incorrect data on the signup form, hosting agreement, or online hosting order application. o Attempts to circumvent or alter the processes or procedures to measure time, bandwidth utilization, or other methods to document "use" of XCarx.xxx'x xroducts and services. MAIL o Sending unsolicited mail messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material (e.g. "spamming").
AutoNDA by SimpleDocs
SYSTEM AND NETWORK. 3.2.1. Introduction of malicious programs into the Company's network or server (e.g., viruses and worms). 3.2.2. Effecting security breaches or disruptions of Internet communication. Security breaches include, but are not limited to, accessing data of which Customer is not an intended recipient or logging into a server or account that Customer is not expressly authorized to access. For purposes of this Section 3.2.2., "disruption" includes, but is not limited to, port scans, flood pings, packet spoofing and forged routing information. 3.2.3. Executing any form of network monitoring which will intercept data not intended for the Customer's server. 3.2.4. Circumventing user authentication or security of any host, network or account. 3.2.5. Interfering with or denying service to any user other than Customer's host (for example, denial of service attack). 3.2.6. Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable, a user's terminal session, via any means, locally or via the Internet. 3.2.7. Creating an "active" full time connection on a Company-provided account by using artificial means involving software, programming or any other method. 3.2.8. Any attempt to circumvent or alter monitoring, bandwidth tracking or utilization reporting, or other actions which have the effect of complicating the normal operational procedures of the Company, including but not limited to altering, removing or in any way modifying or tampering with Company created log files. 3.2.9. Any action which the Company determines, in its own judgment, will reflect poorly on the Company or negatively impact its operations. 3.2.10. Any action which the Company deems to be an unacceptable use of resources, business practice or otherwise unacceptable to the Company.
SYSTEM AND NETWORK o Introduction of malicious programs into the network or Server (e.g. viruses, worms, Trojan horses, etc.). o Attempted or successful security breaches or disruption of Internet communication. Security breaches include, but are not limited to, accessing data of which Client is not an intended recipient or logging into a Server or account that Client is not expressly authorized to access. o Client may not execute any form of network monitoring (e.g. packet sniffer) which will intercept data not intended for Client Server. o Attempts to circumvent Client authentication or security of any host, network, or account ("cracking"). o Attempts to interfere with or deny service to any user or any host (e.g. Denial of Service Attacks). o Use of any program/script/command, or sending messages of any kind, designed to interfere with a third party Clients terminal session, via any means, locally or via the Internet.
SYSTEM AND NETWORK. 3.2.1. Introduction of malicious programs into the network or server (e.g., viruses and worms). 3.2.2. Effecting security breaches or disruptions of Internet communication. Security breaches include, but are not limited to, accessing data of which Customer is not an intended recipient or logging into a server or account that Customer is not expressly authorized to access. For purposes of this Section 3.2.2., "disruption" includes, but is not limited to, port scans, flood pings, packet spoofing and forged routing information .

Related to SYSTEM AND NETWORK

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Unbundled Network Elements 35.4.1. The charges that CLEC shall pay to Sprint for Unbundled Network Elements are set forth in Table One of this Agreement. 35.5. Collocation 35.5.1. The charges that CLEC shall pay to Sprint for Collocation are set forth in Table Two of this Agreement. 35.6. Call Related Databases 6.1. The charges that CLEC shall pay to Sprint for Call Related Databases purchased pursuant to Part J are set forth in Table One of this Agreement.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • NON-NETWORK PROVIDER is a provider that has not entered into a contract with us or any other Blue Cross and Blue Shield plan. For pediatric dental care services, non-network provider is a dentist that has not entered into a contract with us or does not participate in the Dental Coast to Coast Network. For pediatric vision hardware services, a non-network provider is a provider that has not entered into a contract with EyeMed, our vision care service manager.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • System Upgrades The Connecting Transmission Owner shall procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement. To the extent that design work is necessary in addition to that already accomplished in the Class Year Interconnection Facilities Study for the Interconnection Customer, the Connecting Transmission Owner shall perform or cause to be performed such work. If all the Parties agree, the Interconnection Customer may construct System Upgrade Facilities and System Deliverability Upgrades. 5.2.1 As described in Section 32.3.5.3 of the SGIP in Attachment Z of the ISO OATT, the responsibility of the Interconnection Customer for the cost of the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement shall be determined in accordance with Attachment S of the ISO OATT, as required by Section 32.3.5.3.2

  • System Timeout The system providing access to PHI COUNTY discloses to 11 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 12 must provide an automatic timeout, requiring re-authentication of the user session after no more than 13 twenty (20) minutes of inactivity.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!