Email Protection Sample Clauses

Email Protection a. Xxxx defends employee inboxes against various attacks, including:
AutoNDA by SimpleDocs
Email Protection. Email Protection is licensed on a User basis. When using Email Protection Customer is responsible for all activities conducted under its user logins. Email Protection is for use with normal business messaging traffic only, and Customer shall not use Email Protection for the machine generated message delivery of bulk or unsolicited emails or emails sent from an account not assigned to an individual. Customer is responsible for maintaining the outbound email filtering Email Protection configuration settings to block emails identified by Proofpoint as either containing a virus or having a spam score of ninety-five (95) or higher. If Proofpoint has reason to believe that Customer has modified the outbound email configuration setting, Proofpoint reserves the right to monitor and reset such settings. Customer is solely responsible for any damage or loss to a third party resulting from the Customer's own use of the Proofpoint Product in violation of: (a) applicable law; or (b) the terms and conditions of the Agreement. Each User must be assigned a separate account on Customer’s email server for sending or receiving messages or data within Customer’s email system or network. Internal Threat Management (ITM) SaaS. ITM SaaS deploys software (an Agent) onto Customer owned or controlled desktops and servers on supported platforms. These Agents capture metadata (Metadata Capture) and visual screen content (Visual Capture) recorded from the activities of monitored Users and store this data in Proofpoint’s ITM SaaS service. ITM SaaS Metadata Feed allows Customer to export its captured User metadata. A licensed User of ITM SaaS is a unique individual with a unique access credential being monitored by Customer, regardless of whether the Agents are deployed on physical or virtual systems. If an individual has more than one access credential, then a separate User license for each of that individual’s unique access credentials must be purchased. A licensed User of ITM SaaS may also be a unique Server (physical or virtual) with a unique access credential being monitored by the Customer. ITM SaaS Metadata Capture, and ITM SaaS Metadata Capture with Visual Capture, are subject to the ingestion rate(s) and retention time tiers described in the Proofpoint quote or Order Form. Additionally, both the ITM SaaS Metadata Capture with Visual Capture and ITM Additional Visual Capture are further subject to the aggregate data storage limit(s) described in the Proofpoint quote or Order For...
Email Protection. Email Protection is licensed on a User basis. When using Email Protection Customer is responsible for all activities conducted under its user logins. Email Protection is for use with normal business messaging traffic only, and Customer shall not use Email Protection for the machine generated message delivery of bulk or unsolicited emails or emails sent from an account not assigned to an individual. Customer is responsible for maintaining the outbound email filtering Email Protection configuration settings to block emails identified by Proofpoint as either containing a virus or having a spam score of ninety-five (95) or higher. If Proofpoint has reason to believe that Customer has modified the outbound email configuration setting, Proofpoint reserves the right to monitor and reset such settings. Customer is solely responsible for any damage or loss to a third party resulting from the Customer's own use of the Proofpoint Product in violation of: (a) applicable law; or (b) the terms and conditions of the Agreement. Each User must be assigned a separate account on Customer’s email server for sending or receiving messages or data within Customer’s email system or network. Mail Routing Agent. Customer is responsible for maintaining the outbound email filtering MRA configuration settings established by Proofpoint to filter and block emails identified by Proofpoint as either containing a virus or having a spam score of 95 or higher. If Proofpoint has reason to believe that Customer has modified the outbound email configuration setting, Proofpoint reserves the right to monitor and reset such settings.
Email Protection. Protection against email-born security threats including phishing, malware, spam, and other forms of objectionable or dangerous content. Cyber Security Features that have been added to the new CTSNet Assurance with Cyber Defense Plan: • Annual Comprehensive Vulnerability Scan o An assessment solution to pinpoint vulnerabilities, configuration issues, and malware that attackers use to penetrate a network. o Each scan provides insights into the vulnerabilities along with remediation suggestions. • SIEM/SOC Service o Within our security incident and event management platform, a dedicated team of security analysts monitors the logs and live events received from your critical IT devices and rapidly respond to detected threats to your business data. In addition, our analysts perform a daily review of all logs and security event notifications 7x365. o Cost-efficient monitoring, detection and response meets regulatory requirements, including HIPAA, PCI-DSS, GLBA, SOX, NIST, to name a few. • CTSI eSecure Email Filtering - Advanced o Protection against email-born security threats including phishing, malware, spam, and other forms of objectionable or dangerous content.

Related to Email Protection

  • Legal Protection 7.14.1 The University shall provide legal representation to any Member of the Bargaining Unit who is named a defendant in a civil action based on performance of the Member’s duties within the scope of employment. Legal representation will be at the Member’s request, subject to the approval of the Ohio Attorney General and in accordance with Ohio law. Pursuant to Ohio Revised Code Section 9.87 the University shall seek indemnification from the state for liability or judgment of any Member of the Bargaining Unit resulting from the performance of his or her duties for the University. Nothing in this Section is intended to expand or conflict with current Ohio law.

  • Fall Protection Fall restraint or fall arrest protection required where a fall of more than 2.4 meters is possible. NO EXCEPTIONS.

  • ENVIRONMENT, SAFETY AND HEALTH PROTECTION (a) Seller shall perform this Agreement in a manner that ensures adequate protection for workers, the public, and the environment, and shall be accountable for actions of itself and its lower-tier subcontractors, agents and employees. Seller shall exercise a degree of care commensurate with the work and the associated hazards. Seller shall ensure that management of environment, safety and health (ES&H) functions and activities is an integral and visible part of Seller’s work planning and execution process. In the event that Xxxxxx fails to comply with this Agreement, Company may, without prejudice to any other legal or contractual rights, issue an order stopping all or any part of the work; thereafter a start order for resumption of work may be issued at Company’s discretion. Seller shall make no claim for an extension of time or for compensation or damages by reason of or in connection with such work stoppage. In addition, Company may require, in writing, that Seller remove from the work any employee the Company deems unsafe, incompetent, careless, or otherwise objectionable.

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • Staff Protection A. The District shall protect certificated employees acting within the scope of their employment by purchasing liability insurance in the amount of at least five million dollars ($5,000,000) per occurrence, and the District shall include the certificated employees as named insured under the liability insurance and errors and omissions policy of the school district.

  • TEACHER PROTECTION Section A: Working Conditions Paragraph 1: The Board agrees to str ive continually to provide working condi- tions which meet federal, state and local laws and regulations.

  • Environmental Protection Except as set forth in Schedule 5.13 annexed hereto:

  • Physical Protection Employees may protect themselves, other employees, teachers, administrators, or students, from attacks, physical abuse or injury, or may prevent damage to school district property.

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes:

  • Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position:

Time is Money Join Law Insider Premium to draft better contracts faster.