Network and Systems Clause Samples

The 'Network and Systems' clause defines the responsibilities and requirements related to the use, maintenance, and security of computer networks and IT systems within an agreement. It typically outlines standards for system performance, data protection, and access controls, and may specify obligations for both parties to prevent unauthorized access or disruptions. This clause ensures that both parties maintain secure and reliable technological infrastructure, thereby minimizing risks of data breaches, downtime, or operational failures.
Network and Systems. The policy referred to above forms part of this Agreement. The acceptable use conditions apply to the use of the device, school network and internet while on school premises, and at any time the student is using their school account to access various services (email, OneDrive, etc.). Communication through internet and online communication services must also comply with school rules and policies, which are available on the school website. While on the school network, students should not: • Create, access or circulate files or other content that attempts to undermine, hack into and/or bypass the hardware and/or software security mechanisms that are in place. • Disable settings for virus protection, spam and/or internet filtering that have been applied by the Department. • Use unauthorised programs or intentionally download unlicensed media/content/software. • Intentionally damage or disable computers, computer systems, printers, network devices, the school or government networks. • Use the device for unauthorised commercial activities, lobbying, gambling or any unlawful purpose. Note: Students’ use of internet and online communication services, associated with their school account, may be audited at the request of appropriate authorities for investigative purposes surrounding inappropriate use. Use of the school's ICT network is secured with a user name and password. The password must be difficult enough so as not to be guessed by other users and is to be kept private by the student and not divulged to other individuals (e.g. a student should not share their username and password with other students). IT Technicians may require your password to perform maintenance and repairs. The password should be changed regularly, as well as when prompted by the department or when it may have become known by another person. School network account credentials are not to be shared. Students should not allow others to use their account for any reason. Students are responsible for all actions taken using their account credentials. Students should log off, or lock their screen, at the end of each session to ensure no one else can use their account or device. If available, students should also set an extra level of password protection for access to their BYOD device. This could be in the form of a boot-up password or other lock screen. Parents/caregivers may also choose to maintain an administrator account on a personally-owned device for access to the device in the event thei...
Network and Systems. The policy referred to above forms part of this Agreement. The acceptable use conditions apply to the use of the device, school network and internet while on school premises, and at any time the student is using their school account to access various services (email, OneDrive, etc.). Communication through internet and online communication services must also comply with school rules and policies, which are available on the school website. While on the school network, students should not: • Create, access or circulate files or other content that attempts to undermine, hack into and/or bypass the hardware and/or software security mechanisms that are in place. • Disable settings for virus protection, spam and/or internet filtering that have been applied by the Department. • Use unauthorised programs or intentionally download unlicensed media/content/software. • Intentionally damage or disable computers, computer systems, printers, network devices, the school or government networks. • Use the device for unauthorised commercial activities, lobbying, gambling or any unlawful purpose. Note: Students’ use of internet and online communication services, associated with their school account, may be audited at the request of appropriate authorities for investigative purposes surrounding inappropriate use.
Network and Systems a) All network components, servers and purchased and custom applications that are part of the payment card system must conform to all current PCI-DSS requirements. For more information, visit ▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇. An outline of the primary principles and requirements follows. Refer to the PCI-DSS (located online at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇) for the detailed elements of each. i. Building and maintaining a secure network 1. Install and maintain a firewall configuration to protect data 2. Do not use vendor supplied defaults for system passwords and other security parameters 2. Encrypt transmission of cardholder data and sensitive information across public networks. iii. Maintaining a Vulnerability Management Program 1. Use and regularly updated anti-virus software 2. Develop and maintain secure systems and applications. iv. Implementing Strong Access Control Measures 1. Restrict access to data by business need to know 2. Assign an unique ID to each person with computer access 3. Restrict physical access to cardholder data v. Regularly Monitoring and Testing Networks 1. Track and monitor all access to network resources and cardholder data 2. Regularly test security systems and processes vi. Maintain a Department Information Security Departmental Policy that addresses information security standards which follows and meets all University Information Security Standards and PCI-DSS requirements.

Related to Network and Systems

  • Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;

  • Network Interconnection Methods 3.1 The Interconnection provided herein may not be used solely for the purpose of originating a Party’s own interexchange traffic.

  • Network Upgrades The Transmission Owner shall design, procure, construct, install, and own the Network Upgrades described in Attachment 6 of this Agreement. If the Transmission Owner and the Interconnection Customer agree, the Interconnection Customer may construct Network Upgrades that are located on land owned by the Interconnection Customer. Unless the Transmission Owner elects to pay for Network Upgrades, the actual cost of the Network Upgrades, including overheads, shall be borne initially by the Interconnection Customer.

  • Network Services Preventive care: 100% coverage. Preventive services include, but are not restricted to routine physical exams, routine gynecological exams, routine hearing exams, routine eye exams, and immunizations. A $100 single and $200 family combined annual deductible will apply to lab/diagnostic testing after which 100% coverage will apply. A $50 copay will apply to CT and MRI scans.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.