Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Advertisement on Project Highway The Project Highway or any part thereof shall not be used in any manner to advertise any commercial product or services.
Internet Connection Certain Solutions may require an active and stable connection to the Internet in order to function. It is therefore your responsibility to ensure that you have at all times an active and stable Internet connection.
Load Shedding The Distributor may carry out Load Shedding in the following circumstances: (a) Maintenance of Network equipment: if the Distributor wishes to inspect or effect alterations, maintenance, repairs, or additions to any part of the Network, subject to clauses 4.6, 4.8, 4.10, and Schedule 5 as applicable; (b) Permitted by Service Standards: as permitted by the Service Standards, if the Customer has elected to receive an interruptible or otherwise non-continuous supply of electricity; (c) Compliance with instructions from the System Operator: (i) to comply with a request or instruction received from the System Operator in accordance with the Code; or (ii) if communication with the System Operator has been lost, and the Distributor reasonably believes that, had communication with the System Operator been maintained, the Distributor would have received a request or instruction from the System Operator to shed load in accordance with the Code; (d) Maintain security and safety: to maintain the security and safety of the Network in order to: (i) maintain a safe environment, consistent with the Distributor's health and safety policies; (ii) prevent unexpected short term overloading of the Network; (iii) prevent voltage levels rising or falling outside of legal requirements; (iv) manage System Security; and (v) avoid or mitigate damage to the Network or any equipment connected to the Network; (e) Compliance with the Code: to comply with the Code or the law; or (f) Other circumstances: for any other purpose that, in the Distributor’s reasonable opinion, and in accordance with Good Electricity Industry Practice, requires the interruption or reduction of delivery of electricity to any ICP.
System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.