Network Traffic Routing Sample Clauses

Network Traffic Routing. Vendor’s network traffic routing policy shall protect Comcast’s information security and data integrity. There shall be no opportunity for the mingling of Comcast’s Proprietary Information with other non-Comcast traffic. Vendor’s network traffic routing policy shall ensure only traffic destined for Comcast targets is directed to the point-to-point virtual private network (“VPN”) between Vendor and Comcast and any other traffic, including local network traffic and general Internet traffic, is not directed to the VPN.
AutoNDA by SimpleDocs
Network Traffic Routing. Vendor’s network traffic routing policy shall protect Comcast's information security and data integrity. There shall be no opportunity for the mingling of Comcast's Proprietary Information with other non-Comcast traffic. Vendor’s network traffic routing policy shall ensure only traffic destined for Comcast targets is directed to the point-to-point virtual private network (“VPN”) between Vendor and Comcast and any other traffic, including local network traffic and general Internet traffic, is not directed to the VPN. X. Anti-Virus.Vendor shall maintain industry standard methods for defense against malware/trojan/virus infection. Vendor shall maintain a program of anti-malware/anti-virus updates to keep Vendor desktops free of infection. Vendor shall at regular intervals desktop execute scans and/or desktop image refresh actions to ensure workstation integrity and minimize the likelihood of infection. X. Protocol Exceptions:Exceptions to the stipulated protocols may be granted with prior written consent from Comcast. 29 COMCAST AND XXXXXXX.XXX CONFIDENTIAL EXHIBIT B: PARTNER CONNECTION REQUEST POLICIES In granting access to Comcast networks, Comcast assumes certain risks caused by systems beyond the administrative control of Comcast Information Technology controls and Comcast Information Security controls. To limit those risks, Comcast requires that all third party partners connecting to Comcast internal networks take reasonable actions to ensure that the third party partner network does not negatively impact the confidentiality, integrity, and availability of Comcast Information Assets, and that the confidentiality of Comcast information on third party partner systems is adequately maintained. While Comcast requires vendors accessing its network to take reasonable measures to protect their information assets, Comcast provides no assistance to third party partners on matters of network configuration, computer security, or application assistance, other than that which is deemed necessary by Comcast to connect to Comcast Information Assets. Policy Applicable Not Applicable Third Party Partner Requirements x Payment Card Industry Data Security Standards x Access Control Policy x Authentication Policy x Change Management Policy x Employee Personal Information Security Policy x Payment Card Protection Policy x Software Compliance Policy x
Network Traffic Routing. Vendor’s network traffic routing policy shall protect Comcast’s information security and data integrity. There shall be no opportunity for the mingling of Comcast’s Proprietary Information with other non-Comcast traffic. Vendor’s network traffic routing policy shall ensure only traffic destined for Comcast targets is directed to the point-to-point virtual private network (“VPN”) between Vendor and Comcast and any other traffic, including local network traffic and general Internet traffic, is not directed to the VPN. X. Anti-Virus. Vendor shall maintain industry standard methods for defense against malware/trojan/virus infection. Vendor shall maintain a program of anti-malware/anti-virus updates to keep Vendor desktops free of infection. Vendor shall at regular intervals desktop execute scans and/or desktop image refresh actions to ensure workstation integrity and minimize the likelihood of infection. X.

Related to Network Traffic Routing

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Hosting 46.7.4.1 At CLEC’s request, SBC-SWBT and SBC-AMERITECH shall perform hosting responsibilities for the provision of billable message data and/or access usage data received from CLEC for distribution to the appropriate billing and/or processing location or for delivery to CLEC of such data via SBC-SWBT’s and SBC-AMERITECH’s internal network or the nationwide CMDS network pursuant to the applicable Appendix HOST, which is/are attached hereto and incorporated herein by reference.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Hosting Services 13.1 If Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract Hosts Customer Data in connection with an Acquisition, the provisions of Appendix 1, attached hereto and incorporated herein, apply to such Acquisition.

  • Support Services HP’s support services will be described in the applicable Supporting Material, which will cover the description of HP’s offering, eligibility requirements, service limitations and Customer responsibilities, as well as the Customer systems supported.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Data Loss Prevention Transfer Agent shall implement a data leakage program that is designed to identify, detect, monitor and document Fund Data leaving Transfer Agent’s control without authorization in place.

Time is Money Join Law Insider Premium to draft better contracts faster.