Communications Security Sample Clauses

Communications Security. Comcast shall put data transfer policies and procedures in place to protect Company PI that is transferred electronically.
AutoNDA by SimpleDocs
Communications Security. 8.1. Network security management The Contractor should ensure that all networks and network services are secured as appropriate, for example by way of network segregation where appropriate.
Communications Security. The Partner shall maintain and implement effective controls to ensure protection of information networks and its supporting IT assets, and to maintain the end-to-end security of information transferred within and outside of its organisation.
Communications Security. The Data Processor must maintain network security using commercially available equipment and industry standard techniques, including firewalls and intrusion detection systems. The infrastructure must be segmented to at least separate production systems from test and development environments. All personal data transmitted by the Data Processor must be encrypted while in transit. dele
Communications Security. To establish controls for the protection of information in networks and their associated facilities. To ensure the security of information being transferred within Convercent and with external parties.
Communications Security. Sublessor retains the right to establish ----------------------- procedures and equipment and software configurations to provide communications security for the telephone system and the computer wiring in all areas of the Premises. Sublessee shall provide and operate its own computer and telephone network.
Communications Security. C.2.9.1. The data processor shall deploy a secure Virtual Private Network (VPN) connection for its staff accessing its internal network remotely. Users shall use a two-factor authentication in order to enable the VPN connection.
AutoNDA by SimpleDocs
Communications Security. (a) Firewalls: Ring Central deploys reasonably appropriate firewall technology in operation of the Services. .
Communications Security. Jostens supports standards and procedures that ensures confidentiality, integrity, and availability of information and services with continuous oversight on new threats and vulnerabilities by a documented risk assessment process driving risk mitigation implementation on a timely basis.
Communications Security 
Time is Money Join Law Insider Premium to draft better contracts faster.