Network Management Controls Sample Clauses

The Network Management Controls clause establishes requirements and procedures for overseeing and securing an organization's network infrastructure. It typically mandates the implementation of technical safeguards such as firewalls, intrusion detection systems, and regular monitoring to prevent unauthorized access or data breaches. By setting clear expectations for network oversight, this clause helps ensure the integrity and security of data transmissions, reducing the risk of cyberattacks and maintaining compliance with relevant security standards.
Network Management Controls. Each Party shall provide a 24-hour contact number for Network Traffic Management issues to the other's network surveillance management center. A fax number must also be provided to facilitate event notifications for planned mass calling events. Additionally, both Parties agree that they shall work cooperatively that all such events shall attempt to be conducted in such a manner as to avoid degradation or loss of service to other end-users. Each Party shall maintain the capability of respectively implementing basic protective controls such as "Cancel To" and "Call Gap."
Network Management Controls. Both Parties will work cooperatively to apply sound network management principles by invoking appropriate network management controls (e.g., call gapping) to alleviate or prevent network congestion.
Network Management Controls. 14 C. Law Enforcement and Civil Process ........................ 14 D.
Network Management Controls. BellSouth will work cooperatively with Satcom to apply sound network management principles by invoking appropriate network management controls, e.g., call gapping, to alleviate or prevent network congestion.
Network Management Controls. 8.2.1 Each Party shall provide a 24-hour contact number for network traffic management issues to the other's surveillance management center. A FAX number must also be provided to facilitate notifications for planned mass calling events. 8.2.2 Any Party may use or request protective network traffic management controls such as 7-digit and 10-digit code gaps on traffic to or from each other’s network, when required to protect the public switched network from congestion due to Facility failures, switch congestion, or failure or focused overload. The Parties will immediately notify each other of any protective control action planned or executed. 8.2.3 Where the capability exists, originating or terminating traffic reroutes may be implemented by any Party to temporarily relieve network congestion due to Facility failures or abnormal calling patterns. Reroutes will not be used to circumvent normal Trunk servicing. Expansive controls will only be used when the Parties mutually agree. 8.2.4 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes, in order to prevent or mitigate the impact of these events on the public switched network. 8.2.5 Carrier shall acknowledge calls in accordance with the following protocols. 8.2.5.1 Carrier will provide a voice intercept announcement or distinctive tone signals to the calling party when a call is directed to a number that is not assigned by Carrier. 8.2.5.2 Carrier will provide a voice announcement or distinctive tone signals to the calling party when a call has been received and accepted by Carrier's MSC. 8.2.5.3 Carrier and SBC-13STATE will work cooperatively to install and maintain a reliable network. Carrier and SBC-13STATE will exchange appropriate information (e.g., maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government and such other information as the Parties shall mutually agree) to achieve this desired reliability. 8.2.6 When Carrier's MSC is not able to complete calls because of a malfunction in the MSC or other equipment, Carrier will either divert the call to its operator, or provide a recorded announcement to the calling party advising that the call cannot be completed. 8.2.7 Carrier will provide supervisory tones or voice announcements to the calling party on all calls, consistent with standard telephone i...
Network Management Controls. BellSouth will work cooperatively with Supra Telecommunications and Information Systems, Inc. to apply sound network management principles by invoking appropriate network management controls, e.g., call gapping, to alleviate or prevent network congestion.
Network Management Controls. Each Party shall provide a 24-hour contact number for network surveillance issues to the other Party’s network management center. An E-mail address must also be provided to facilitate event notifications for planned mass calling events. Additionally, both Parties agree that they shall work cooperatively so that all such events shall attempt to be conducted in such a manner as to avoid degradation or loss of service to other end users. Each Party shall maintain the capability of respectively implementing basic protective controls.
Network Management Controls. BellSouth will work cooperatively with Computer Business Sciences to apply sound network management principles by invoking appropriate network management controls, e.g., call gapping, to alleviate or prevent network congestion.
Network Management Controls. BellSouth will work cooperatively with AXSYS to apply sound network management principles by invoking appropriate network management controls, e.g., call gapping, to alleviate or prevent network congestion.
Network Management Controls. 17 C. Law Enforcement and Civil Process .......................... 17 X. CALL TRACE ....................................................... 18 XI. TAXES ............................................................ 18