Network Security Requirements Sample Clauses

Network Security Requirements. HTTPS (SSL) TCP 443 must be allowed from machine to the Internet. Please tick on check box and fill in required information if those set up will be implemented Service: All services on (Consumable + Meter + Fault alert & Green Report) OR Meter alert only For a smooth EP-BB installation process, please ensure that the following information is available prior to receive the call from our remote engineer or an onsite visit. FUJIFILM will send the software to the contact person listed above via Email.
AutoNDA by SimpleDocs
Network Security Requirements. Telocity shall implement the security features and procedures for the Telocity Services as described in Exhibit G ("Security").
Network Security Requirements. AT&T is currently reviewing its Network Security policies and procedures. The outcome of this review may require AT&T to implement additional security requirements above and beyond the Data Connectivity Agreement (“DCA”) associated with this Agreement. AT&T may require Supplier’s employees to obtain security clearances in order to access and use AT&T systems. If AT&T implements additional security requirements, both parties shall cooperate and mutually agree on implementation of such security requirements.
Network Security Requirements. AT&T is currently reviewing its Network Security policies and procedures. The outcome of this review may require AT&T to implement additional security requirements above and beyond the Data Connectivity Agreement (“DCA”) associated with this Agreement. AT&T may require Supplier’s employees to obtain security clearances in order to access and use AT&T systems. If AT&T implements additional security requirements, both parties shall cooperate and mutually agree on implementation of such security requirements. In support of AT&T’s security and integrity initiatives, Supplier shall abide by and assure full compliance with the contractual requirements concerning AT&T’s proprietary information (including but not limited to CPNI (“Customer Proprietary Network Information”) and ensure that their employees operate with the highest standard of business ethics. Additionally, Supplier shall manage an inventory of all System IDs issued to Supplier employees, assuring the deletion of said System IDs when Supplier employee resigns, transfers to a non-AT&T program, or transfers to other AT&T business units other than Service Provider.
Network Security Requirements. AT&T is currently reviewing its Network Security policies and procedures. The outcome of this review may require AT&T to implement additional security requirements above and beyond the Data Connectivity Agreement (“DCA”) associated with this Agreement. AT&T may require Supplier’s employees to obtain security clearances in order to access and use AT&T systems. If AT&T implements additional security requirements, both parties shall cooperate and mutually agree on implementation of such security requirements. Proprietary Information The information contained in this Agreement is not for use or disclosure outside AT&T, Supplier, their Affiliates and their third party representatives, except under written agreement by the contracting Parties Q. Productivity Improvement / Cost Reduction During the term of this Order, AT&T and Supplier shall work together to reduce total time and work time per customer order and improve all tasks associated with this Program recognizing that quality must not be impaired. Supplier agrees to identify productivity improvements to drive cost reductions and headcount reductions associated with Supplier’s billable rates. AT&T’s Program Representative has sole discretion to review and approve any headcount reduction, productivity improvement and/or cost reduction initiative identified by Supplier. If such headcount reduction, productivity improvement and/or cost reduction initiative is approved by AT&T, Supplier shall implement such initiative and once the cost savings have begun to be realized, all applicable cost reductions shall immediately be applied to all charges by Supplier invoiced to AT&T, per the applicable rates listed in Section IX PRICING SCHEDULE and any gain sharing initiatives that have been mutually agreed upon. If any substantial expense or capital investment is required by Supplier to implement an approved productivity improvement or cost reduction initiative, AT&T and Supplier will mutually agree to any such investment arrangement. Within forty-five (45) days of the signing of this Agreement, Supplier and AT&T will work to identify and quantify productivity improvement opportunities for cost reductions referenced above. AT&T and Supplier have agreed to evaluate gain sharing opportunities on a case-by-case basis. If both parties mutually agree to a specific gain sharing initiative, the associated agreement shall specify how the realized cost savings will be applied. Proprietary Information The information contained in...
Network Security Requirements. AT&T is currently reviewing its Network Security policies and procedures. The outcome of this review may require AT&T to implement additional security requirements above and beyond the Data Connectivity Agreement (“DCA”) associated with this Agreement. AT&T may require Supplier’s employees to obtain security clearances in order to access and use AT&T systems. If AT&T implements additional security requirements, both parties shall cooperate and mutually agree on implementation of such security requirements. Proprietary Information The information contained in this Agreement is not for use or disclosure outside AT&T, Supplier, their Affiliates and their third party representatives, except under written agreement by the contracting Parties.

Related to Network Security Requirements

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Policy Requirements All of the policies of insurance referred to in this Article XIII shall be written in form reasonably satisfactory to Landlord and any Facility Mortgagee and issued by insurance companies with a minimum policyholder rating of “A-” and a financial rating of “VII” in the most recent version of Best’s Key Rating Guide, or a minimum rating of “BBB” from Standard & Poor’s or equivalent. If Tenant obtains and maintains the general liability insurance described in Section 13.1(e) above on a “claims made” basis, Tenant shall provide continuous liability coverage for claims arising during the Term. In the event such “claims made” basis policy is canceled or not renewed for any reason whatsoever (or converted to an “occurrence” basis policy), Tenant shall either obtain (a) “tail” insurance coverage converting the policies to “occurrence” basis policies providing coverage for a period of at least three (3) years beyond the expiration of the Term, or (b) an extended reporting period of at least three (3) years beyond the expiration of the Term. Tenant shall pay all of the premiums therefor, and deliver certificates thereof to Landlord prior to their effective date (and with respect to any renewal policy, prior to the expiration of the existing policy), and in the event of the failure of Tenant either to effect such insurance in the names herein called for or to pay the premiums therefor, or to deliver such certificates thereof to Landlord, at the times required, Landlord shall be entitled, but shall have no obligation, to effect such insurance and pay the premiums therefor, in which event the cost thereof, together with interest thereon at the Overdue Rate, shall be repayable to Landlord upon demand therefor. Tenant shall obtain, to the extent available on commercially reasonable terms, the agreement of each insurer, by endorsement on the policy or policies issued by it, or by independent instrument furnished to Landlord, that it will give to Landlord thirty (30) days’ (or ten (10) days’ in the case of non-payment of premium) written notice before the policy or policies in question shall be altered, allowed to expire or cancelled. Notwithstanding any provision of this Article XIII to the contrary, Landlord acknowledges and agrees that the coverage required to be maintained by Tenant may be provided under one or more policies with various deductibles or self-insurance retentions by Tenant or its Affiliates, subject to Landlord’s approval not to be unreasonably withheld. Upon written request by Xxxxxxxx, Tenant shall provide Landlord copies of the property insurance policies when issued by the insurers providing such coverage.

  • Authority Requirements During the Compliance Period, the following provisions shall apply.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Encryption Requirements Transfer Agent will not locally store Fund Data on any laptops or mobile devices (e.g., Blackberries, PDAs) managed by Transfer Agent.

  • Business Day Requirements In the event that any notice or other action or omission is required to be taken by a Party under this Agreement on a day that is not a Business Day then such notice or other action or omission shall be deemed to be required to be taken on the next occurring Business Day.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Personal Property Requirements The Collateral Agent shall have received:

  • Quality Requirements Performance Indicator Heading Indicator (specific) Threshold Method of Measurement Frequency of monitoring Consequence of Breach QUALITY Patient Safety - Incidents I1 Number of incidents Adverse incidents include the following: clinical or non clinical adverse events that have potential to cause avoidable harm to a patient, including medical errors or adverse events related to medical devices or other equipment. Clinical or non- clinical accidents, accidental injuries to staff and members of the public, verbal, physical or psychological abuse or harassment, unusual or dangerous occurrences, damage to trust property, plant or equipment, fire or flood, security, theft or loss, near misses are identified as any event where under different circumstances significant injury or loss may have occurred Number of recorded incidents in the contract month Monthly Remedial Action Plan brought to Performance Meeting following breach; action under Module C Clause 32 if needed I2 Number of Sis Definition of SUI according to trust policy and national guidance Number of Serious Untoward Incidents reported in contract month Monthly Remedial Action Plan brought to Performance Meeting following breach; action under Module C Clause 32 if needed S1 Percentage of eligible staff received child safeguarding training at level 2 (as identified in LSCB training strategy) 95% Number received training/ Number of identified staff requiring training Monthly S2 Percentage of eligible staff received adult safeguarding awareness training at level 2 ( as identified in K&M Safeguarding Vulnerable Adults training strategy) 95% Number of staff trained/ Number of identified staff requiring training Monthly

  • Maintenance of Securities and Cash at Bank and Subcustodian Locations Unless Instructions specifically require another location acceptable to the Bank:

Time is Money Join Law Insider Premium to draft better contracts faster.