Protective Protocols Sample Clauses

Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each other’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. CLEC and Sprint will immediately notify each other of any protective control action planned or executed.
AutoNDA by SimpleDocs
Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward the other Party’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure, or focused overload. Each Party will provide appropriate industry standard notification to the other Party of any such protective control action which has been executed by that Party. To the extent that prior notification is commercially reasonable and consistent with industry practice, each Party will provide prompt notification to the other Party of any such protective control action which will be executed by the Party.
Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward the other Party’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure, or focused overload. AT&T and BA will immediately notify each other of any protective control action planned or executed.
Protective Protocols. 46 5.2 Expansive Protocols 46 5.3 Mass Calling 46 6.0 Forecasting/Servicing Responsibilities 46 7.0 Trunk Servicing 46 ATTACHMENT 5: INTENTIONALLY LEFT BLANK 48 ATTACHMENT 6: UNBUNDLED NETWORK ELEMENTS (UNES) 49 1.0 Introduction 49 2.0 Unbundled Loops 52 3.0 NETWORK INTERFACE DEVICE (NID) 53 4.0 Cross-Connects 56 5.0 Provisioning/Maintenance of Network Elements on an Unbundled Basis 56 6.0 Maintenance of Elements 57 7.0 Performance of Network Elements 58 8.0 Pricing 58
Protective Protocols. All traffic between users and the application occurs over HTTPS with TLS 1.2. • Connections between application and database are encrypted using TLS. • Application servers, database servers exist in a private virtual network. • Network Security groups are used to restrict access to application/database servers. • IAM policies are used to limit employee access to cloud computing resources. • OS Security patches are installed in a timely manner. • AWS GuardDuty is used to detect anomalous cloud account activity. • Data is encrypted in transit and at rest at a minimum of 128-bit AES. • Maintain a Data Incidence Response Plan which aligns with the NIST Cybersecurity Framework v1.1. • Adopted practices and procedures which align with applicable NIST principles and industry- standard practices. • Annual training for employees and contracted personnel, covering: - FERPA law overview - COPPA law overview - Cybersecurity and best practices - State-specific requirements (as applicable) - Data security incident plans (for relevant employees) - How to handle requests for data access/erasure (for relevant employees) - How to verify identity for requests relating to customer data (for relevant employees) Data Destruction: Upon expiration of an agreement or termination of use, data may be securely destroyed or transferred, per and upon request from the EA or customer, barring any legal obligations. Data Incident Response: The following process will be followed when responding to a suspected incident:
Protective Protocols. 5.1.1 Either party may se protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each others network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. MCIm and BellSouth will immediately notify each other of any protective control action planned or executed.
Protective Protocols. Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic toward each other’s network, when required to protect the public switched network from congestion due to facility failures, switch congestion or failure or focused overload. PAETEC and CenturyLink will immediately notify each other of any protective control action planned or executed.
AutoNDA by SimpleDocs
Protective Protocols. Either Party may use protective network traffic management controls such as 3, 7, and 10 digit network controls on traffic toward each other’s network, when required to protect the public switched network from congestion due to facility failures, Switch congestion or failure, or focused overload. MCIm and Verizon shall promptly notify each other of any significant protective control action executed.

Related to Protective Protocols

  • Protocol No action to coerce or censor or penalize any negotiation participant shall be made or implied by any other member as a result of participation in the negotiation process.

  • Confidential Information Protections 4.1 At all times during and after the Employee’s employment, the Employee will hold in confidence and will not disclose, use, lecture upon, or publish any of Company’s Confidential Information (defined below), except as may be required in connection with the Employee’s work for Company, or as expressly authorized by the Board. The Employee will obtain the written approval of the Board before publishing or submitting for publication any material (written, oral, or otherwise) that relates to the Employee’s work at Company and/or incorporates any Confidential Information. The Employee hereby assigns to Company any rights the Employee may have or acquire in any and all Confidential Information and recognize that all Confidential Information shall be the sole and exclusive property of Company and its assigns.

  • California Accessibility Disclosure For purposes of Section 1938(a) of the California Civil Code, Landlord hereby discloses to Tenant, and Tenant hereby acknowledges, that the Project has not undergone inspection by a Certified Access Specialist (CASp). In addition, the following notice is hereby provided pursuant to Section 1938(e) of the California Civil Code: “A Certified Access Specialist (CASp) can inspect the subject premises and determine whether the subject premises comply with all of the applicable construction-related accessibility standards under state law. Although state law does not require a CASp inspection of the subject premises, the commercial property owner or lessor may not prohibit the lessee or tenant from obtaining a CASp inspection of the subject premises for the occupancy or potential occupancy of the lessee or tenant, if requested by the lessee or tenant. The parties shall mutually agree on the arrangements for the time and manner of the CASp inspection, the payment of the fee for the CASp inspection, and the cost of making any repairs necessary to correct violations of construction-related accessibility standards within the premises.” In furtherance of and in connection with such notice: (i) Tenant, having read such notice and understanding Tenant’s right to request and obtain a CASp inspection, hereby elects not to obtain such CASp inspection and forever waives its rights to obtain a CASp inspection with respect to the Premises, Building and/or Project to the extent permitted by Legal Requirements; and (ii) if the waiver set forth in clause (i) hereinabove is not enforceable pursuant to Legal Requirements, then Landlord and Tenant hereby agree as follows (which constitutes the mutual agreement of the parties as to the matters described in the last sentence of the foregoing notice): (A) Tenant shall have the one-time right to request for and obtain a CASp inspection, which request must be made, if at all, in a written notice delivered by Tenant to Landlord; (B) any CASp inspection timely requested by Tenant shall be conducted (1) at a time mutually agreed to by Landlord and Tenant, (2) in a professional manner by a CASp designated by Landlord and without any testing that would damage the Premises, Building or Project in any way, and (3) at Tenant’s sole cost and expense, including, without limitation, Tenant’s payment of the fee for such CASp inspection, the fee for any reports prepared by the CASp in connection with such CASp inspection (collectively, the “CASp Reports”) and all other costs and expenses in connection therewith; (C) the CASp Reports shall be delivered by the CASp simultaneously to Landlord and Tenant; (D) Tenant, at its sole cost and expense, shall be responsible for making any improvements, alterations, modifications and/or repairs to or within the Premises to correct violations of construction-related accessibility standards including, without limitation, any violations disclosed by such CASp inspection; and (E) if such CASp inspection identifies any improvements, alterations, modifications and/or repairs necessary to correct violations of construction-related accessibility standards relating to those items of the Building and Project located outside the Premises that are Landlord’s obligation to repair as set forth in this Lease, then Landlord shall perform such improvements, alterations, modifications and/or repairs as and to the extent required by Legal Requirements to correct such violations, and Tenant shall reimburse Landlord for the cost of such improvements, alterations, modifications and/or repairs within 10 business days after Tenant’s receipt of an invoice therefor from Landlord.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

Time is Money Join Law Insider Premium to draft better contracts faster.