Wireless Access Sample Clauses

Wireless Access. Wireless access to the Zoom corporate network must be configured to require authentication and be encrypted.
AutoNDA by SimpleDocs
Wireless Access. Control Maintain processes and tools to track, control, prevent, and correct the secure use of wireless local area networks (WLANs), access points, and wireless client systems.
Wireless Access. The Service is available for use at all times except during maintenance periods, or such other hours as established by Bank from time to time. Transmissions made after Bank cut-off hour on a business day, or on any day that is not a business day, are treated as occurring on the next business day. Client’s access to the Remote Deposit Capture Service via Client’s Wireless Access Device (“Wireless RDC”) is subject to Bank’s prior and ongoing approval. Bank may deny Client’s access to all or any part of the Remote Deposit Capture Service, at Bank’s sole discretion, including wireless access. To access and utilize Wireless RDC, Client will provision at Client’s expense a compatible supported Wireless Access Device that complies with Bank access requirements (as posted on our website and amended from time to time) and is connected to the Internet through Client’s mobile communications service provider. If Client obtains a different Wireless Access Device, Client will be required to download and install software, to that different Wireless Access Device, under the same terms set forth in this Service Description, as amended from time to time. Client agrees to delete all such software from Client’s Wireless Access Device promptly if the licenses or this Service Description terminate for any reason. The availability, timeliness and proper functioning of Wireless RDC depends on many factors, including Client’s Wireless Access Device location, wireless network availability and signal strength, and the proper functioning and configuration of hardware, Software, and Client’s Wireless Access Device. Client agrees that Client is solely responsible for any data that is transmitted, supplied or entered by Client or anyone on Client’s behalf or any transaction Bank receives through the Service even if it is not authorized by Client. Neither Bank nor any of Bank’s service providers warrant that Wireless RDC will operate without interruption, and neither Bank nor Bank’s service providers shall be liable for any loss or damage caused by any unavailability of Wireless RDC, including service interruptions, delays, or loss of personalized settings. Neither Bank nor any of Bank’s service providers assume responsibility for the operation, security, functionality or availability of any Wireless Access Device or mobile network which Client utilizes to access the Remote Deposit Capture Service. Client agrees that, when Client uses Wireless RDC, Client remains subject to the terms and...
Wireless Access. Each participating school will be provided with a wireless connection. The Provider will be responsible for deploying switches and/or controllers, sized for the school’s needs, that connects the buildings router and wireless access points. The portable computing devices will access the wireless LAN including network, switch, servers, access points, and associated hardware to provide a robust network environment for the student and teacher devices. This includes access from the school environment via the wireless network and any provided servers and the services it provides, including access to shared applications and files. Any proposed servers the Bidder may propose should include a description of where the servers will be located. The Provider is responsible for all associated costs and services necessary to incorporate any proposed servers into the Provider's solution. Additional access points, wiring, electrical and equipment (if necessary) will also be provided as a local school option. Each Bidder must describe its solution’s capabilities as well as its limitations (e.g., interference susceptibility, distance, spatial streams and object penetration), including what wireless industry standards (e.g., 802.11g, 802.11n, 802.11ac, etc.) are employed in the solution.
Wireless Access. 2.2.12.1 Departments shall take appropriate steps, including the implementation of appropriate encryption, user authentication, device authentication and malware protection measures, to mitigate risks to the security of County data and information systems associated with the use of wireless network access technologies. 2.2.12.2 Only wireless systems that have been evaluated for security by both department management and OCIT Enterprise Privacy and Cybersecurity shall be approved for connectivity to County networks. 2.2.12.3 County data that is transmitted over any wireless network shall be protected in accordance with the sensitivity of the information. 2.2.12.4 All access to County networks or resources via unapproved wireless communication technologies is prohibited. This includes wireless systems that may be brought into County facilities by visitors or guests. Employees, contractors, vendors and customers are prohibited from connecting and/or activating wireless connections on any computing device that are simultaneously connected to any County network, either locally or remotely. 2.2.12.5 Each department shall make a regular, routine effort to ensure that unauthorized wireless networks, access points, and/or modems are not installed or configured within its IT environments. Any unauthorized connections described above shall be disabled immediately.
Wireless Access. A. Any individual using a wireless device is prohibited from attaching the device to any SVHC wireless network without proper authorization from the Director of Information Technology or his designate. B. All wireless access to the SVHC network must use strong passwords and encryption methods. C. With the exception of authorized security testing, any attempt to circumvent the SVHC wireless security systems for wireless access to or though the SVHC network is prohibited.
Wireless Access. 2.32.1. Wireless access must be authorised, users and computing devices authenticated, and wireless traffic encrypted to ensure that only authorised individuals and computing devices gain wireless access to networks and limit the risk of wireless transmissions being intercepted. 2.32.2. Wireless monitoring and intrusion prevention technologies must be employed. 2.32.3. Wireless networks must be compliant with latest NIST WiFi security guide.
AutoNDA by SimpleDocs
Wireless Access. All efforts will be made to provide wireless access at school and out of district, we do not guarantee availability. All buildings have a building-wide wireless access system which student may log in to during the day. Students are provided a wireless access point that is fully filtered and configured to match the district network filter for use while out of district.
Wireless Access. Refers to high-speed wireless communication data terminals, based on LTE, GSM/EDGE and UMTS/HSPA technologies. Throughput is delivered on a best effort basis relative to the wireless signal strength and capacity available with the local wireless provider network for each location The Customer does not by virtue of the Service Agreement or otherwise howsoever acquire any ownership or other interest whatsoever in Supplier’s Network or Customer’s Local Loop except the right to access and use same in accordance with, and subject to, the terms of the Service Agreement.
Wireless Access. Wireless access is available is most places on campus. Faculty and staff can access the internet by connecting to the WU-Employee access point. When prompted, the SSID will be westernu. Once connected, open Internet Explorer and use your current WesternU e-mail credentials to access the internet.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!