Wireless Networking Sample Clauses
The Wireless Networking clause defines the terms and conditions under which wireless internet access is provided within a premises or facility. It typically outlines the responsibilities of both the provider and the user, such as acceptable use policies, security requirements, and any limitations on bandwidth or access. For example, it may specify that users must not interfere with the network or use it for unlawful activities. The core function of this clause is to ensure the secure, lawful, and efficient use of wireless networking resources, while clearly allocating responsibility and managing potential risks associated with wireless connectivity.
Wireless Networking. When using radio frequency (RF) based wireless networking technologies to perform or support Services for AT&T, ensure that all of AT&T’s Information transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of AT&T’s Information; provided, however, that in any event such encryption shall use no less than key lengths of 256-bits for symmetric encryption and 256-bits for asymmetric encryption. Exception: The use of RF-based wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement.
Wireless Networking. When using **** based wireless networking technologies to perform or support Services for AT&T, ensure that all of AT&T’s Information transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of AT&T’s Information; provided, however, that in any event such encryption shall use no less than key lengths of ****. Exception: The use of **** wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement. ****CERTAIN INFORMATION HAS BEEN OMITTED AND FILED SEPARATELY WITH THE COMMISSION. CONFIDENTIAL TREATMENT HAS BEEN REQUESTED WITH RESPECT TO THE OMITTED PORTIONS.
Wireless Networking. CBTS will provide wireless networking management for the customer network that consists of the CPE leased to the customer. The following RACI chart outlines the roles and responsibilities for common network management activities: Customer CBTS Provide minimum of 1 SSID, maximum of 4 SSIDs per location A R Perform non-predictive, best effort wireless survey A R Basic wifi analytics A,I R Guest wifi splash page A R WPA2 Encryption for WLAN Access A R Rate-limit guest wifi A R Client device settings R, A Integrate and/or configure customer-owned wireless networking equipment R, A I WLAN Access Control R, A I
Wireless Networking. Cincinnati Bell will provide wireless networking management for the customer network that consists of the CPE leased to the customer. The following RASCI chart outlines the roles and responsibilities for common network management activities: Provide minimum of 1 SSID, maximum of 5 SSIDs per location A R Perform non-predictive, best effort wireless survey A R Basic wifi analytics A,I R Guest wifi splash page A R WPA2 Encryption for WLAN Access A R Rate-limit guest wifi A R Client device settings R, A Heat map location R, A Integrate and/or configure customer-owned wireless networking equipment R, A I RF Spectrum Analysis A R WLAN Access Control R, A I
Wireless Networking. If using wireless networking technologies to perform or support Services for Subscriber, the Supplier shall ensure that all Subscriber Data transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of Subscriber Data; provided, however, that in any event such encryption shall use no less than key lengths of 256-bits for symmetric encryption and 256-bits for asymmetric encryption. The use of RF-based wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement.
Wireless Networking. If approved in writing by ▇▇▇▇▇▇▇, when using radio frequency (RF) based wireless networking technologies to perform or support Services for ▇▇▇▇▇▇▇, the Supplier shall ensure that all ▇▇▇▇▇▇▇ Data transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of ▇▇▇▇▇▇▇ Data.. The use of RF-based wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement.
