Customer Network Security Sample Clauses

Customer Network Security. Without limiting anything set forth in the AUP, Customer acknowledges and agrees that Customer is responsible for, and for the security, of Customer Resources. To that end, Customer agrees to take all reasonable steps to protect virtual and physical access to the Software and Services originating from or transmitted through or to Customer Resources. Without limiting the foregoing, Customer will maintain any reasonable and appropriate administrative, physical, and technical level of security (and such other requirements in accordance with applicable Law) regarding its account ID, password, antivirus and firewall protections, and connectivity with the Services. Without limiting the foregoing, Customer shall be responsible for the confidentiality and use of Customer’s username, password, and other security data, methods and devices. Customer understands that Customer shall be solely responsible for all information electronically transmitted (including Customer’s submission of Service and Change Orders, and trouble tickets), or use of any data, information regarding the Services, or use of the Services, themselves, obtained using Customer’s username, password, and other security data. Customer shall immediately notify BluIP if there is any unauthorized use of Customer’s passwords or other security data or any use inconsistent with the terms of the Agreement. EXCEPT TO THE EXTENT OF BLUIP’S DEFAULT OF ITS OBLIGATIONS UNDER SECTION 4.5 OF THIS MSA, BLUIP SHALL NOT BE RESPONSIBLE OR OBLIGATED FOR ANY COSTS, FEES, EXPENSES OR LIABILITIES AT LAW OR AT EQUITY ACCRUING AS A RESULT OF ANY UNAUTHORIZED USE OF CUSTOMER’S PASSWORD OR OTHER SECURITY DATA. IN ADDITION, AND WITHOUT LIMITING ANY OF ITS OBLIGATIONS UNDER SECTION 4.5, CUSTOMER SHALL MAINTAIN STRICT SECURITY OVER ALL BLUIP COMMUNICATION SERVICE LINES.
AutoNDA by SimpleDocs
Customer Network Security. Customer acknowledges and agrees that Customer is responsible for Customer’s network and Resources, including without limitation the software, equipment, any remote computers and devices, and any wireless or wired Internet connection that Customer uses to access the Software or Services (collectively, the “Customer Network”). More particularly, Customer is responsible for the virtual and physical security of the Customer Network and the development of reasonable physical and virtual security safeguards, policies, and procedures, including, without limitation, the use of industry recognized internet security, and antivirus software. Customer agrees to take commercially reasonable steps to protect virtual and physical access to the Software and Services originating from the Customer Network.
Customer Network Security. Customer acknowledges and agrees that Customer is responsible for Customer’s network and Resources, including without limitation the software, equipment, any remote computers and devices, and any wireless or wired Internet connection that Customer uses to access the Software or Services (collectively, the “Customer Network”). More particularly, Customer is responsible for the virtual and physical security of the Customer Network and the development of reasonable physical and virtual security safeguards, policies, and procedures, including, without limitation, the use of industry recognized internet security, and antivirus software. Customer agrees to take commercially reasonable steps to protect virtual and physical access to the Software and Services originating from the Customer Network. Customer may be asked to provide Masergy or its designated third party provider with temporary or guest rights to Resources to assist Masergy in testing; however, Customer is then responsible for ensuring that any such rights are disabled.
Customer Network Security. Customer is responsible for maintaining the security of its internal network from unauthorised access through the Internet. Cybernet shall not be liable for unauthorised access to Customer's network or other breaches of Customer's network security.
Customer Network Security. Customer is responsible for Customer’s network and Resources, including without limitation the software, equipment, any remote computers and devices, and any wireless or wired Internet connection that Customer uses to access the Software or Services (collectively, the “Customer Network”). Customer is responsible for the virtual and physical security of the Customer Network and the development of reasonable physical and virtual security safeguards, policies, and procedures, including, without limitation, the use of industry recognized internet security, and antivirus software. Customer agrees to take commercially reasonable steps to protect virtual and physical access to the Software and Services originating from the Customer Network. Customer may be asked to provide Masergy or its designated third party provider with temporary or guest rights to Resources to assist Masergy in testing; however, Customer is then responsible for ensuring that any such rights are disabled.
Customer Network Security. Customer agrees that it will exercise commercially reasonable care and diligence not to pass any computer virus, worm, bug, or other computer infection to Mako. Customer is solely responsible for providing awareness and training to its Internal End Users as well as for securing its own network, technologies and assets used to access the Services.

Related to Customer Network Security

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Customer Feedback The contractor is expected to establish and maintain professional communication between its employees and customers. The primary objective of this communication is customer satisfaction. Customer satisfaction is the most significant external indicator of the success and effectiveness of all services provided and can be measured through customer complaints and surveys. Performance management drives the contractor to be customer focused through initially and internally addressing customer complaints and investigating the issues and/or problems but the customer always has the option to communicate complaints to the PM, as opposed to the contractor. Customer feedback may also be obtained either from the results of formal customer satisfaction surveys or from random customer complaints. Any customer complaints will be investigated by the PM using the Quality Assurance Monitoring Form – Customer Complaint Investigation, identified in Attachment A4.

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • Customer Content As part of the Services provided under this Agreement, Customer Data will be stored and processed in the data center region specified in the applicable Ordering Document. Axway shall not access Customer Content except in response to support or technical issues where Customer provides Axway with prior Customer’s written authorization required to access such Customer Content. Axway is not responsible for unauthorized access, alteration, theft or destruction of Customer Content arising from Customer’s own or its authorized users’ actions or omissions in contravention of the Documentation. Customer’s ability to recover any lost data resulting from Axway’s misconduct is limited to restoration by Axway from the most recent back-up.

Time is Money Join Law Insider Premium to draft better contracts faster.