Network Security Requirements Clause Samples

Network Security Requirements. AT&T is currently reviewing its Network Security policies and procedures. The outcome of this review may require AT&T to implement additional security requirements above and beyond the Data Connectivity Agreement (“DCA”) associated with this Agreement. AT&T may require Supplier’s employees to obtain security clearances in order to access and use AT&T systems. If AT&T implements additional security requirements, both parties shall cooperate and mutually agree on implementation of such security requirements.
Network Security Requirements. AT&T is currently reviewing its Network Security policies and procedures. The outcome of this review may require AT&T to implement additional security requirements above and beyond the Data Connectivity Agreement (“DCA”) associated with this Agreement. AT&T may require Supplier’s employees to obtain security clearances in order to access and use AT&T systems. If AT&T implements additional security requirements, both parties shall cooperate and mutually agree on implementation of such security requirements. In support of AT&T’s security and integrity initiatives, Supplier shall abide by and assure full compliance with the contractual requirements concerning AT&T’s proprietary information (including but not limited to CPNI (“Customer Proprietary Network Information”) and ensure that their employees operate with the highest standard of business ethics. Additionally, Supplier shall manage an inventory of all System IDs issued to Supplier employees, assuring the deletion of said System IDs when Supplier employee resigns, transfers to a non-AT&T program, or transfers to other AT&T business units other than Service Provider.
Network Security Requirements. HTTPS (SSL) TCP 443 must be allowed from machine to the Internet.
Network Security Requirements. Telocity shall implement the security features and procedures for the Telocity Services as described in Exhibit G ("Security").

Related to Network Security Requirements

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable. 2. Provide service site(s) that will promote attainment of Contractor’s program objectives. Arrange the physical environment to support those activities. 3. Decrease program costs when possible by procuring items at no cost from County surplus stores and by accepting delivery of such items by County.

  • City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.