Encrypted Tunnel. The preferred connectivity method is via the Internet to an Authority Virtual Private Network (VPN) device. The Authority may loan Outside Entity the required client software for establishing VPN connections with the Authority. The Authority’s perimeter security measures will control access to the internal network.
Appears in 1 contract
Sources: Network Connection Agreement
Encrypted Tunnel. The preferred connectivity method is via the Internet to an Authority Virtual Private Network (VPN) device. The Authority may loan Outside Entity the required client software for establishing VPN connections with the Authority. The Authority’s perimeter security measures will control access to the internal network.network.
Appears in 1 contract
Sources: Network Connection Agreement