Security Monitoring and Mitigation Sample Clauses

Security Monitoring and Mitigation. Crown Castle monitors the Edge Device utilized in connection with the Product. Crown Castle does not provide monitoring of security events, any security event mitigation or advice regarding security issues or threats. Upon request by Licensee, Crown Castle will modify the configuration of the Product in accordance with the specifications provided by Licensee to attempt to mitigate security events and security threats identified by Licensee. Crown Castle’s sole obligation is to implement the configuration settings requested by Licensee. Crown Castle makes no guarantees with respect to the detection or blocking of viruses/worm/malware or any other types of attacks, and is not responsible for any malicious data that may be transmitted over the Underlay Product.
Security Monitoring and Mitigation. Company monitors the Edge Device utilized in connection with the Product. Company does not provide monitoring of security events, any security event mitigation or advice regarding security issues or threats. Upon request by Licensee, Company will modify the configuration of the Product in accordance with the specifications provided by Licensee to attempt to mitigate security events and security threats identified by Licensee. Company’s sole obligation is to implement the configuration settings requested by Licensee. Company makes no guarantees with respect to the detection or blocking of viruses/worm/malware or any other types of attacks, and is not responsible for any malicious data that may be transmitted over the Underlay Product.
Security Monitoring and Mitigation. For the Services, Comcast monitors the equipment. COMCAST DOES NOT PROVIDE MONITORING OF SECURITY EVENTS, ANY SECURITY EVENT MITIGATION, OR ADVICE REGARDING SECURITY ISSUES OR THREATS. Upon request by Customer, Comcast will modify the configuration of the Services in accordance with specifications provided by Customer to attempt to mitigate security events and security threats identified by Customer. Comcast’s sole obligation is to implement the configuration settings requested by Customer. This Service is provided on a commercially reasonable efforts basis only and Comcast makes no guarantees with respect to the detection or blocking of viruses/worm/malware or any other types of attacks and is not responsible for any such malicious data that may be transmitted over the provided network.
Security Monitoring and Mitigation. Planet monitors the Edge Device utilized in connection with the Product. Planet does not provide monitoring of security events, any security event mitigation or advice regarding security issues or threats. Upon request by Licensee, Planet will modify the configuration of the Product in accordance with the specifications provided by Licensee to attempt to mitigate security events and security threats identified by Licensee. Planet’s sole obligation is to implement the configuration settings requested by Licensee. Planet makes no guarantees with respect to the detection or blocking of viruses/worm/malware or any other types of attacks, and is not responsible for any malicious data that may be transmitted over the Underlay Product.
Security Monitoring and Mitigation. Crown Castle monitors the Edge Device utilized in connection with the Ethernet Integrated with SD-WAN Product. Crown Castle does not provide monitoring of security events, any security event mitigation or advice regarding security issues or threats. Upon request by Licensee, Crown Castle will modify the configuration of the Ethernet Integrated with SD-WAN Product in accordance with the specifications provided by Licensee to attempt to mitigate security events and security threats identified by Licensee. Crown Castle’s sole obligation is to implement the configuration settings requested by Licensee. Crown Castle makes no guarantees with respect to the detection or blocking of viruses/worms/malware or any other types of attacks, and is not responsible for any malicious data that may be transmitted over the Ethernet Integrated with SD-WAN Product.

Related to Security Monitoring and Mitigation

  • Program Monitoring and Evaluation The Recipient shall prepare, or cause to be prepared, and furnish to the Association not later than six months after the Closing Date, a report of such scope and in such detail as the Association shall reasonably request, on the execution of the Program, the performance by the Recipient and the Association of their respective obligations under the Legal Agreements and the accomplishment of the purposes of the Financing.”

  • Reporting and Monitoring Please provide a brief description of the mechanisms proposed for this project for reporting to the UNDP and partners, including a reporting schedule.

  • Monitoring and Compliance Every year during the term of this Agreement on the anniversary date of the effective date of the Agreement, the Restaurant shall provide to the United States a narrative report of the actions taken during the reporting period to remove any barriers to access and otherwise enhance accessibility for individuals with disabilities at the Restaurant and any plans for action concerning ADA compliance in the coming year. The report shall include as an exhibit copies of any complaint, whether formal or informal, received during the reporting period alleging that the Restaurant was not being operated in compliance with the ADA or otherwise discriminated against any person on account of disability. The Owner and Operator of the Restaurant shall cooperate in good faith with any and all reasonable requests by the United States for access to the Restaurant and for information and documents concerning the Restaurant's compliance with this Agreement and the ADA. The United States shall have the right to verify compliance with this Agreement and the ADA, both as set forth in this Agreement and through any means available to the general public, including visits to the public areas of the Restaurant and communications with Restaurant staff. The United States shall have the right to inspect the facility at any time, and counsel for the United States need not identify themselves in the course of visits to the public areas.

  • Monitoring and Review The Provider agrees to allow access to the Department for purposes of monitoring and review. This access includes but is not limited to client records, fiscal records, staffing records, policy and procedural manuals, facilities, staff, and children in care of the Department. The Department will conduct quality reviews, which may include site-based quality review visits.

  • Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following: