Communications Security Sample Clauses

Communications Security. 8.1. Network security management The Contractor should ensure that all networks and network services are secured as appropriate, for example by way of network segregation where appropriate.
AutoNDA by SimpleDocs
Communications Security. Comcast shall put data transfer policies and procedures in place to protect Company PI that is transferred electronically.
Communications Security. The Partner shall maintain and implement effective controls to ensure protection of information networks and its supporting IT assets, and to maintain the end-to-end security of information transferred within and outside of its organisation.
Communications Security. The Data Processor must maintain network security using commercially available equipment and industry standard techniques, including firewalls and intrusion detection systems. The infrastructure must be segmented to at least separate production systems from test and development environments. All personal data transmitted by the Data Processor must be encrypted while in transit. dele
Communications Security. To establish controls for the protection of information in networks and their associated facilities. To ensure the security of information being transferred within Convercent and with external parties.
Communications Security. Sublessor retains the right to establish ----------------------- procedures and equipment and software configurations to provide communications security for the telephone system and the computer wiring in all areas of the Premises. Sublessee shall provide and operate its own computer and telephone network.
Communications Security. C.2.9.1. The data processor shall deploy a secure Virtual Private Network (VPN) connection for its staff accessing its internal network remotely. Users shall use a two-factor authentication in order to enable the VPN connection.
AutoNDA by SimpleDocs
Communications Security. (a) Firewalls: Ring Central deploys reasonably appropriate firewall technology in operation of the Services. .
Communications Security 

Related to Communications Security

  • Preservation of Information; Communications to Noteholders (a) The Indenture Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of the Holders of Notes contained in the most recent list furnished to the Indenture Trustee as provided in Section 7.01 and the names and addresses of Holders of Notes received by the Indenture Trustee in its capacity as Note Registrar. The Indenture Trustee may destroy any list furnished to it as provided in such Section 7.01 upon receipt of a new list so furnished.

  • Noteholder Communications Noteholders may communicate with other Noteholders about their rights under this Indenture or under the Notes. Within ten (10) days following receipt by the Indenture Trustee of a request by three (3) or more Noteholders to receive a copy of the current list of Noteholders, the Indenture Trustee will (i) provide a current list of Noteholders to the Noteholders making the request and (ii) notify the Administrator of the request by giving to the Administrator a copy of the request and a copy of the list of Noteholders produced in response to the request.

Time is Money Join Law Insider Premium to draft better contracts faster.