Wireless Networking Sample Clauses

Wireless Networking. 68. When using radio frequency (RF) based wireless networking technologies to perform or support Services for AT&T, ensure that all of AT&T’s Information transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of AT&T’s Information; provided, however, that in any event such encryption shall use no less than key lengths of 256-bits for symmetric encryption and 256-bits for asymmetric encryption. Exception: The use of RF-based wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement.
AutoNDA by SimpleDocs
Wireless Networking. 68. When using **** based wireless networking technologies to perform or support Services for AT&T, ensure that all of AT&T’s Information transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of AT&T’s Information; provided, however, that in any event such encryption shall use no less than key lengths of ****. Exception: The use of **** wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement. Proprietary and Confidential This Agreement and information contained therein is not for use or disclosure outside of AT&T, its Affiliates, and third party representatives, and Supplier except under written agreement by the contracting parties. ****CERTAIN INFORMATION HAS BEEN OMITTED AND FILED SEPARATELY WITH THE COMMISSION. CONFIDENTIAL TREATMENT HAS BEEN REQUESTED WITH RESPECT TO THE OMITTED PORTIONS. SG021306.S.025 Connectivity Requirements
Wireless Networking. CBTS will provide wireless networking management for the customer network that consists of the CPE leased to the customer. The following RACI chart outlines the roles and responsibilities for common network management activities: Customer CBTS Provide minimum of 1 SSID, maximum of 4 SSIDs per location A R Perform non-predictive, best effort wireless survey A R Basic wifi analytics A,I R Guest wifi splash page A R WPA2 Encryption for WLAN Access A R Rate-limit guest wifi A R Client device settings R, A Integrate and/or configure customer-owned wireless networking equipment R, A I WLAN Access Control R, A I
Wireless Networking. If using wireless networking technologies to perform or support Services for Subscriber, the Supplier shall ensure that all Subscriber Data transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of Subscriber Data; provided, however, that in any event such encryption shall use no less than key lengths of 256-bits for symmetric encryption and 256-bits for asymmetric encryption. The use of RF-based wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement.
Wireless Networking. Cincinnati Bell will provide wireless networking management for the customer network that consists of the CPE leased to the customer. The following RASCI chart outlines the roles and responsibilities for common network management activities: Customer Cincinnati Bell Provide minimum of 1 SSID, maximum of 5 SSIDs per location A R Perform non-predictive, best effort wireless survey A R Basic wifi analytics A,I R Guest wifi splash page A R WPA2 Encryption for WLAN Access A R Rate-limit guest wifi A R Client device settings R, A Heat map location R, A Integrate and/or configure customer-owned wireless networking equipment R, A I RF Spectrum Analysis A R WLAN Access Control R, A I
Wireless Networking. 46. When using radio frequency (RF) based wireless networking technologies to perform or support Services for AT&T, ensure that all of In-Scope Information transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of In-Scope Information; provided, however, that in any event such encryption shall use no less than key lengths of 256-bits for symmetric encryption and 256-bits for asymmetric encryption. The use of RF-based wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement. Proprietary and Confidential This Agreement and information contained therein is not for use or disclosure outside of AT&T, its Affiliates, and third party representatives, and Supplier except under written agreement by the contracting parties. 123 Software and Professional Services Agreement
Wireless Networking. If approved in writing by Xxxxxxx, when using radio frequency (RF) based wireless networking technologies to perform or support Services for Xxxxxxx, the Supplier shall ensure that all Xxxxxxx Data transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of Xxxxxxx Data.. The use of RF-based wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement.
AutoNDA by SimpleDocs

Related to Wireless Networking

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Telecommunications Services The offering of telecommunications for a fee directly to the public, or to such classes of users as to be effectively available directly to the public, regardless of the facilities used.

  • Hosting 46.7.4.1 At CLEC’s request, SBC-SWBT and SBC-AMERITECH shall perform hosting responsibilities for the provision of billable message data and/or access usage data received from CLEC for distribution to the appropriate billing and/or processing location or for delivery to CLEC of such data via SBC-SWBT’s and SBC-AMERITECH’s internal network or the nationwide CMDS network pursuant to the applicable Appendix HOST, which is/are attached hereto and incorporated herein by reference.

  • TELEPHONE SERVICES All telegraph, telephone, and communication connections which Tenant may desire outside the Premises shall be subject to Landlord’s prior written approval, in Landlord’s sole discretion, and the location of all wires and the work in connection therewith shall be performed by contractors approved by Landlord and shall be subject to the direction of Landlord, except that such approval is not required as to Tenant’s cabling from the Premises in a route designated by Landlord to any telephone cabinet or panel provided for Tenant’s connection to the telephone cable serving the Building, so long as Tenant’s equipment does not require connections different than or additional to those to the telephone cabinet or panel provided. As to any such connections or work outside the Premises requiring Landlord’s approval, Landlord reserves the right to designate and control the entity or entities providing telephone or other communication cable installation, removal, repair and maintenance outside the Premises and to restrict and control access to telephone cabinets or panels. In the event Landlord designates a particular vendor or vendors to provide such cable installation, removal, repair and maintenance for the Building, Tenant agrees to abide by and participate in such program. Tenant shall be responsible for and shall pay all costs incurred in connection with the installation of telephone cables and communication wiring in the Premises, including any hook-up, access and maintenance fees related to the installation of such wires and cables in the Premises and the commencement of service therein, and the maintenance thereafter of such wire and cables; and there shall be included in Operating Expenses for the Building all installation, removal, hook-up or maintenance costs incurred by Landlord in connection with telephone cables and communication wiring serving the Building which are not allocable to any individual users of such service but are allocable to the Building generally. If Tenant fails to maintain all telephone cables and communication wiring in the Premises and such failure affects or interferes with the operation or maintenance of any other telephone cables or communication wiring serving the Building, Landlord or any vendor hired by Landlord may enter into and upon the Premises forthwith and perform such repairs, restorations or alterations as Landlord deems necessary in order to eliminate any such interference (and Landlord may recover from Tenant all of Landlord’s costs in connection therewith). No later than the Termination Date, Tenant agrees to remove all telephone cables and communication wiring installed by Tenant for and during Tenant’s occupancy, which Landlord shall request Tenant to remove. Tenant agrees that neither Landlord nor any of its agents or employees shall be liable to Tenant, or any of Tenant’s employees, agents, customers or invitees or anyone claiming through, by or under Tenant, for any damages, injuries, losses, expenses, claims or causes of action because of any interruption, diminution, delay or discontinuance at any time for any reason in the furnishing of any telephone or other communication service to the Premises and the Building.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • Telecommunications Each Lender and Administrative Agent shall be entitled to rely on the authority of any individual making any telecopy, electronic or telephonic notice, request, or signature without the necessity of receipt of any verification thereof.

  • Internet Services Transfer Agent shall make available to Fund and Shareholders, through its web sites, including but not limited to xxx.xxxxxxxxxxxxx.xxx (collectively, “Web Site”), online access to certain Account and Shareholder information and certain transaction capabilities (“Internet Services”), subject to Transfer Agent’s security procedures and the terms and conditions set forth herein and on the Web Site. Transfer Agent provides Internet Services “as is,” on an “as available” basis, and hereby specifically disclaims any and all representations or warranties, express or implied, regarding such Internet Services, including any implied warranty of merchantability or fitness for a particular purpose and implied warranties arising from course of dealing or course of performance. Transfer Agent shall at all times use reasonable care in performing Internet Services under this Agreement.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

Time is Money Join Law Insider Premium to draft better contracts faster.