Network Monitoring Clause Samples

The Network Monitoring clause grants the right to observe, track, and analyze network activity within a specified system or environment. Typically, this involves monitoring data traffic, user access, and system performance to detect unauthorized use, security breaches, or technical issues. By establishing clear authority and procedures for network oversight, this clause helps ensure system integrity, protect sensitive information, and maintain compliance with security policies.
POPULAR SAMPLE Copied 4 times
Network Monitoring. OptiComm will monitor the Network and seek to identify any Fault as early as reasonably possible.
Network Monitoring. Transmissions passing through Verizon Facilities may be subject to legal intercept and monitoring activities by Verizon, its suppliers or local authorities in accordance with applicable local law requirements. To the extent consent or notification is required by Customer or end users under applicable data protection or other laws, Customer grants its consent under and represents that it will have at all relevant times the necessary consents from all end users.
Network Monitoring. Transmissions passing through the facilities of Motorola’s vendors may be subject to legal intercept and monitoring activities by its vendors (or vendors’ suppliers) or local authorities in accordance with applicable local law requirements. To the extent consent or notification is required by Customer or end users under applicable data protection or other laws, Customer grants its consent under and represents that it will have at all relevant times the necessary consents from all end users.
Network Monitoring. All network systems and servers are monitored 24/7/365. Innovative will monitor its systems for security breaches, violations and suspicious (questionable) activity. This includes suspicious external activity (including, without limitation, unauthorized probes, scans or break-in attempts) and suspicious internal activity (including, without limitation, unauthorized system administrator access, unauthorized changes to its system or network, system or network misuse or program information theft or mishandling). Innovative will notify Client as soon as reasonably possible of any known security breaches or suspicious activities involving Client’s production data or environment, including, without limitation, unauthorized access and service attacks, e.g., denial of service attacks.
Network Monitoring. 6.1. As part of the Services, Sprint provides Customer a trouble resolution team available to respond to Customer’s issues 24 hours a day, 365 days a year. Customer may elect to purchase additional monitoring and management services as described in Section 7 below. 6.2. Sprint will provide a trouble ticket number from Sprint's automated Trouble Reporting System (“TRS”) to Customer’s help desk that reports the trouble. For each trouble report, TRS will maintain information about the trouble, the steps taken to resolve the trouble, and the final disposition of the trouble report. Sprint will keep Customer’s representatives apprised of the status of service restoration actions.
Network Monitoring. Pilot’s Network Operations Center (“NOC”) proactively monitors its network and performs cable and conduit maintenance and repair, on a twenty-four (24) hour per day, seven
Network Monitoring. The CENTURYLINK data communications hardware used to terminate circuits will be capable of automatically rerouting traffic in the event of a facility failure where redundant connectivity is available. In addition, CENTURYLINK will measure and report on call delivery times within the Next Gen 9-1-1 Routing solution. CENTURYLINK measures Call Delivery Times from the call's entry into CENTURYLINK network to the delivery of the call to the PSAP's Equipment (ANI/ALI Controller). The type of deployment will affect the estimated Call Setup Time. Within an 8 or 10 digit CAMA deployments, the Call Setup Time duration shall not exceed 5 seconds from the time the call is received by CENTURYLINK LNG. Within an IP deployment (RFAI), the Call Setup Time duration shall not exceed 3 seconds. The Call Setup Times for the CENTURYLINK deployments are reported within the Call Setup Time reports. CENTURYLINK will monitor and analyze the network and equipment as appropriate to meet CENTURYLINK’s obligations in this Technical document.
Network Monitoring. Comcast monitors On-Net Services on a 24x7x365 basis.
Network Monitoring. We reserve the right to monitor and control data volume and/ or types of traffic transmitted via Internet access. In the event that your use does not comply with the terms & conditions, or policies, which you can read on our Website, we reserve the right (at our sole discretion) to reduce, suspend or terminate your Internet access. During any time of reduction or suspension, you will remain liable for the payment of your Service charge.
Network Monitoring. Contractor shall provide monitoring of all critical systems including security patches, drive space, memory usage, file/folder permissions, and Virtual Private Network (VPN) usage.