Network Access Controls Sample Clauses

Network Access Controls a) A documented policy and procedures exist to prevent unauthorized/unsecured devices from accessing the network.
Network Access Controls. Network controls implemented for Oracle address the protection and control of customer data during its transmission from one end system to another. The Oracle Use of Network Services Policy states that computers, servers, and other data devices connected to the Oracle network must comply with Global IT (GIT) and GIS standards for security, configuration, and access method, in accordance with Oracle's Acceptable Use Policy for Company Resources.
Network Access Controls. ● The wireless network in our offices is secured against unauthorized access. Only employees have the password to access these networks.
Network Access Controls. All networks Provider uses to provide the Services must be protected through the use of controls capable of blocking unauthorized network traffic, both inbound (ingress) and outbound (egress). Provider will maintain capabilities to monitor network traffic.
Network Access Controls. All networks used by NTICO to provide the Services and Support are protected by the use of controls capable of blocking unauthorized network traffic, both incoming (incoming) and outgoing (outgoing).

Related to Network Access Controls

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.