Network access and security Clause Samples
The 'Network access and security' clause defines the requirements and responsibilities related to accessing and protecting a network within the context of an agreement. It typically outlines who is permitted to access the network, the security protocols that must be followed (such as password policies or encryption standards), and the measures to be taken in the event of a security breach. This clause ensures that both parties understand their obligations to maintain network integrity and confidentiality, thereby reducing the risk of unauthorized access or data loss.
Network access and security. All users of the ICT systems at the School must first be registered. Following registration, a network user account will be created, consisting of a username, password and an e-mail address. All passwords should be complex to ensure data and network security. All user account details are for the exclusive use of the individual to whom they are allocated. Staff are responsible for ensuring their password remains confidential and their account is secure. Passwords must be regularly changed. All users are personally responsible and accountable for all activities carried out under their user account(s). Users must take all reasonable precautions to protect their user account details and must not share them to any other person, except to designated members of the IT Team for the purposes of system support. Users must report any security breach or suspected breach of their network, email or application account credentials to the Headteacher or School Business Manager as soon as possible. Users should only access areas of the schools computer systems to which they have authorised access. When any computer is left unattended, it must either be logged off or locked. Activity that threatens the integrity of the school ICT systems, or activity which attacks or corrupts other systems, is forbidden. Users’ internet activity must not compromise the security of the data on the school ICT systems or cause difficulties for any other users. Under no circumstances should a pupil be allowed to use a staff computer account, unless being directly supervised by the account owner.
Network access and security. All users of the ICT systems at the College must first be registered. Following registration, and where appropriate, a network user account will be created, consisting of a username, password and an e-mail address. All passwords should be complex to ensure data and network security. All user account details are for the exclusive use of the individual to whom they are allocated. Learners are responsible for ensuring their password remains confidential and their account secure. All users are personally responsible and accountable for all activities carried out under their user account. Users must take all reasonable precautions to protect their user account details and must not share them to any other person, except to designated members of the Network Support Team for the purposes of system support. Users must report any security breach or suspected breach of their network, email or application account credentials to the Network Support Team as soon as possible. Users should only access areas of the college’s computer systems to which they have authorised access. When any computer is left unattended, it must either be logged off or locked. Activity that threatens the integrity of the college ICT systems, or activity which attacks or corrupts other systems, is forbidden. Users’ internet activity must not compromise the security of the data on the college ICT systems or cause difficulties for any other users. Under no circumstances should a learner use a staff computer account, unless being directly supervised by the account owner.
Network access and security. (a) All interconnectivity by HPI to the computing systems and/or networks of SEG, and all attempts at such interconnectivity, shall be only through the security gate-ways/firewalls of the Primary Parties or through such other security means as used by HPI to provide services to SEG immediately prior to the Effective Date; provided, that, during the Ongoing Services Term, SEG may transition any such computing systems and/or networks to such security gateways/firewalls as determined by SEG, and, subject to the limitations set forth below, HPI shall provide commercially reasonable cooperation to SEG in connection with such transition; provided that SEG shall reimburse HPI in full for its reasonable costs or expenses incurred in relation to such cooperation.
(b) Neither Primary Party shall access, and the Primary Parties shall take reasonable actions designed to prevent unauthorized Persons to access, the computing systems and/or networks of the other Primary Party without the other Primary Party’s express written authorization or except as otherwise authorized or reasonably required by the other Primary Party pursuant to this Agreement, and any such actual or attempted access shall be consistent with any such authorization or this Agreement.
(c) The Primary Parties shall use commercially reasonable efforts to maintain, and update pursuant to a commercially reasonable schedule, and more frequently in response to specific threats that become known from time to time, a virus detection/scanning program in connection with the connectivity by SEG to HPI computing systems and/or networks, which shall be consistent in all material respects with that used by such Primary Parties immediately prior to the Effective Date.
(d) HPI shall use commercially reasonable efforts to maintain a prudent security program, consistent in all material respects with that used by HPI immediately prior to the Effective Date, including appropriate physical, electronic and procedural safeguards, designed to (i) maintain the security and confidentiality of HPI’s systems and confidential information of SEG on HPI’s systems, (ii) protect against any threats or hazards to the security or integrity of HPI’s systems, including the confidential, non-public and proprietary information of SEG on HPI’s systems, and (iii) prevent unauthorized access to or use of HPI’s systems, including the confidential, non-public and proprietary information of SEG on HPI’s systems. SEG shall comply with all physical...
Network access and security. All interconnectivity by the Service Provider to the computing systems and/or networks of Aptorum Therapeutics, and all attempts at such interconnectivity, shall be only through the security gate-ways/firewalls of the Parties. Neither Party shall access, and the Parties shall take reasonable actions designed to prevent unauthorized Persons to access, the computing systems and/or networks of the other Party without the other Party’s express written authorization or except as otherwise authorized or reasonably required by the other Party pursuant to this Agreement, and any such actual or attempted access shall be consistent with any such authorization or this Agreement. Each Party shall use commercially reasonable efforts to maintain a prudent security program, consistent in all material respects with that used by the Service Provider immediately prior to the date of this Agreement, including appropriate physical, electronic and procedural safeguards, designed to (i) maintain the security and confidentiality of such Party’s systems and confidential information of the other Party on such systems, (ii) protect against any threats or hazards to the security or integrity of such Party’s systems, including the confidential, non-public and proprietary information of the other Party on such Party’s systems, and (iii) prevent unauthorized access to or use of such Party’s systems, including the confidential, non-public and proprietary information of the other Party on such Party’s systems.
Network access and security. (a) All interconnectivity by Provider to the computing systems and/or networks of the Recipients and all attempts at such interconnectivity shall be only through the security gateways/firewalls of the Parties or through such other security means as used by Provider (or otherwise in accordance with Provider’s then-current security policies) to provide Services to the Business immediately prior to the Closing.
(b) No Party shall access, and the Parties will take reasonable actions designed to prevent unauthorized Persons from accessing, the computing systems and/or networks of any other Party without such other Party’s express written authorization or except as otherwise authorized or reasonably required by such other Party pursuant to this Agreement, and any such actual or attempted access shall be consistent with any such authorization or this Agreement.
(c) The Recipients shall comply with any and all rules, policies and procedures of Provider related to the access and use of the information systems, software and data of Provider (as provided to the Recipients in writing and as may be updated from time to time in the ordinary course of business provided, that Provider shall provide the Recipients and its personnel advanced written notice of any modified rules, policies and procedures), including, without limitation, execution of applicable on-boarding documentation, and rules, policies and procedures applicable to non-employees, visitors, and guests of Provider. If Provider determines, in its reasonable discretion, that further screening of the Recipients’ personnel is required because of the access to systems, premises or information contemplated by the Services, then Provider may also conduct background, reference, educational, criminal record, credit and other checks, as well as finger printing and drug screens (where such testing is permissible by Applicable Law), and require additional agreements on confidentiality and security with such personnel in its reasonable discretion, provided that such background check will not be required to the extent that Recipient personnel will only have access to the premises provided by the Services, and not any information systems of Provider. Attached hereto as Exhibit E are the Cyber Security Incident Reporting and Vulnerability Management processes, which the Parties will complete as soon as practicable. Relationship Managers shall review any security concerns, status of security for specific services, and potent...
Network access and security. Users are not permitted to make any physical alteration either internally or externally, to the School’s computer and network hardware. All users of the ICT systems at the School must first be registered. Following registration, a network user account will be created consisting of a username, password and an e-mail address. All passwords should be of a complex nature to ensure data and network security. All user account details are for the exclusive use of the individual to whom they are allocated. Staff are responsible for ensuring their password remains confidential and their account is secure. Passwords must be regularly changed. All users are personally responsible and accountable for all activities carried out under their user account(s). Users must take all reasonable precautions to protect their user account details and must not share them with any other person, except to designated members of the IT Technical Support Team for the purposes of system support. Users must report any security breach or suspected breach of their network, email or application account credentials to the IT Manager as soon as possible. Users should only access areas of the Schools computer systems to which they have authorised access. When any computer is left unattended, it must either be logged off or locked. Activity that threatens the integrity of the School ICT systems or activity which attacks or corrupts other systems, is forbidden. Users’ internet activity must not compromise the security of the data on the School ICT systems or cause difficulties for any other users.
Network access and security. (a) All interconnectivity by SG Holdings to the computing systems and/or networks of SG DevCo, and all attempts at such interconnectivity, shall be only through the security gate-ways/firewalls of the Parties; provided, that, during the term of this Agreement, SG DevCo may transition any such computing systems and/or networks to such security gateways/firewalls as determined by SG DevCo, and, subject to the limitations set forth below, SG Holdings shall provide commercially reasonable cooperation to SG DevCo in connection with such transition; provided, that SG DevCo shall reimburse SG Holdings in full for its reasonable costs or expenses incurred in relation to such cooperation.
(b) Neither Party shall access, and the Parties shall take reasonable actions designed to prevent unauthorized Persons to access, the computing systems and/or networks of the other Party without the other Party’s express written authorization or except as otherwise authorized or reasonably required by the other Party pursuant to this Agreement, and any such actual or attempted access shall be consistent with any such authorization or this Agreement.
(c) The Parties shall use commercially reasonable efforts to maintain, and update pursuant to a commercially reasonable schedule, and more frequently in response to specific threats that become known from time to time, a virus detection/scanning program in connection with the connectivity by SG DevCo to SG Holdings computing systems and/or networks, which shall be consistent in all material respects with that used by such Parties immediately prior to the date of this Agreement.
(d) Each Party shall use commercially reasonable efforts to maintain a prudent security program, consistent in all material respects with that used by SG Holdings immediately prior to the date of this Agreement, including appropriate physical, electronic and procedural safeguards, designed to (i) maintain the security and confidentiality of such Party’s systems and confidential information of the other Party on such systems, (ii) protect against any threats or hazards to the security or integrity of such Party’s systems, including the confidential, non-public and proprietary information of the other Party on such Party’s systems, and (iii) prevent unauthorized access to or use of such Party’s systems, including the confidential, non-public and proprietary information of the other Party on such Party’s systems. SG DevCo shall comply with all physical, electronic ...
Network access and security. All users of the ICT systems at the School must first be registered. Following registration, a network user account will be created, consisting of a username, password and an e-mail address. All passwords should be complex to ensure data and network security. All user account details are for the exclusive use of the individual to whom they are allocated. Staff are responsible for ensuring their password remains confidential and their account is secure. Passwords must be regularly changed. All users are personally responsible and accountable for all activities carried out under their user account(s). Users must take all reasonable precautions to protect their user account details and must not share them to any other person, except to designated members of the [TEAM/DEPARTMENT]IT support team for the purposes of system support. Users must report any security breach or suspected breach of their network, email or application account credentials to [the Head of SchoolPOSITION] as possible. Users should only access areas of the schools computer systems to which they have authorised access. When any computer is left unattended, it must either be logged off or locked. Activity that threatens the integrity of the school ICT systems, or activity which attacks or corrupts other systems, is forbidden. Users’ internet activity must not compromise the security of the data on the school ICT systems or cause difficulties for any other users. Under no circumstances should a pupil be allowed to use a staff computer account, unless being directly supervised by the account owner.
Network access and security. WSTG uses professional grade routers and switches and firewalls. • WSTG uses a redundant architecture and enterprise level servers. • WSTG configures each server with a switched Gigabyte (1000) Mbps Ethernet connection. • WSTG connects to multiple Internet backbones. • WSTG supports 128-bit encryption via SSL (digital certificates provided by GEO Trust).
Network access and security. All users of the ICT systems at the School must first be registered. Following registration, a network user account will be created, consisting of a username, password and an e-mail address. All passwords should be complex to ensure data and network security. All user account details are for the exclusive use of the individual to whom they are allocated. Staff are responsible for ensuring their password remains confidential and their account is secure. Passwords must be regularly changed.
