Protective Protocols Sample Clauses

Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each other’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. CLEC and Sprint will immediately notify each other of any protective control action planned or executed.
AutoNDA by SimpleDocs
Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward the other Party’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure, or focused overload. Each Party will provide appropriate industry standard notification to the other Party of any such protective control action which has been executed by that Party. To the extent that prior notification is commercially reasonable and consistent with industry practice, each Party will provide prompt notification to the other Party of any such protective control action which will be executed by the Party.
Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward the other Party’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure, or focused overload. AT&T and BA will immediately notify each other of any protective control action planned or executed.
Protective Protocols. 46 5.2 Expansive Protocols 46 5.3 Mass Calling 46 6.0 Forecasting/Servicing Responsibilities 46 7.0 Trunk Servicing 46 ATTACHMENT 5: INTENTIONALLY LEFT BLANK 48 ATTACHMENT 6: UNBUNDLED NETWORK ELEMENTS (UNES) 49 1.0 Introduction 49 2.0 Unbundled Loops 52 3.0 NETWORK INTERFACE DEVICE (NID) 53 4.0 Cross-Connects 56 5.0 Provisioning/Maintenance of Network Elements on an Unbundled Basis 56 6.0 Maintenance of Elements 57 7.0 Performance of Network Elements 58 8.0 Pricing 58
Protective Protocols. 5.1.1 Either party may se protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each others network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. MCIm and BellSouth will immediately notify each other of any protective control action planned or executed.
Protective Protocols. All traffic between users and the application occurs over HTTPS with TLS 1.2. • Connections between application and database are encrypted using TLS. • Application servers, database servers exist in a private virtual network. • Network Security groups are used to restrict access to application/database servers. • IAM policies are used to limit employee access to cloud computing resources. • OS Security patches are installed in a timely manner. • AWS GuardDuty is used to detect anomalous cloud account activity. • Data is encrypted in transit and at rest at a minimum of 128-bit AES. • Maintain a Data Incidence Response Plan which aligns with the NIST Cybersecurity Framework v1.1. • Adopted practices and procedures which align with applicable NIST principles and industry- standard practices. • Annual training for employees and contracted personnel, covering: - FERPA law overview - COPPA law overview - Cybersecurity and best practices - State-specific requirements (as applicable) - Data security incident plans (for relevant employees) - How to handle requests for data access/erasure (for relevant employees) - How to verify identity for requests relating to customer data (for relevant employees) Data Destruction: Upon expiration of an agreement or termination of use, data may be securely destroyed or transferred, per and upon request from the EA or customer, barring any legal obligations. Data Incident Response: The following process will be followed when responding to a suspected incident:
Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each other’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. PAETEC and CenturyLink will immediately notify each other of any protective control action planned or executed.
AutoNDA by SimpleDocs
Protective Protocols. Either Party may use protective network traffic management controls such as 3, 7, and 10 digit network controls on traffic toward each other’s network, when required to protect the public switched network from congestion due to facility failures, Switch congestion or failure, or focused overload. MCIm and Verizon shall promptly notify each other of any significant protective control action executed.

Related to Protective Protocols

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Medical Procedures 1. No teacher shall be required to perform any medical procedures (including but not limited to bandaging cuts/abrasions, gastrostomy tube feedings, tracheostomy suctioning and catheterizations) on any student.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

Time is Money Join Law Insider Premium to draft better contracts faster.