Wireless Security Clause Samples

The Wireless Security clause establishes requirements and standards for securing wireless networks and devices within an organization or under a contract. It typically mandates the use of encryption protocols, secure authentication methods, and regular monitoring to prevent unauthorized access to wireless communications. By setting these expectations, the clause helps protect sensitive data transmitted over wireless networks and mitigates the risk of data breaches or cyberattacks.
Wireless Security. If Custodian deploys a wireless network, Custodian will maintain written policies governing the use, configuration and management of wireless networks. All wireless network devices shall be protected using appropriate physical controls to minimize the risk of theft, unauthorized use, or damage. Network access to wireless networks shall be restricted only to those authorized.
Wireless Security. If Accounting Agent deploys a wireless network, Accounting Agent will maintain written policies governing the use, configuration and management of wireless networks. All wireless network devices shall be protected using appropriate physical controls to minimize the risk of theft, unauthorized use, or damage. Network access to wireless networks shall be restricted only to those authorized.
Wireless Security. You understand that wireless communications may not be encrypted and that there are risks in accessing the Services with wireless devices. Subject to applicable law, you expressly agree to assume all such risks. Wireless communications may not be confidential or secure. Accordingly, you agree to exercise precautions to safeguard your wireless devices, your identity, your Accounts, and your Account information. You agree never to provide your personal information or Account information to any person or through any wireless network you do not know or whose identity you cannot verify. If you do, you assume all risks, subject to applicable law. You agree to remain vigilant for phishing and other fraudulent scams and notify us promptly if you become aware of or suspect fraudulent activity involving your identity, your Accounts, or the Credit Union. You agree to notify us immediately if your wireless device is lost, stolen, or destroyed or if you change your telephone number, email address, or other contact information. If you fail to exercise reasonable care to protect your identity and safeguard your wireless devices and your Accounts, we will not be liable, subject to applicable law.
Wireless Security. If Convercent deploys a wireless network, Convercent will maintain written policies governing the use, configuration and management of wireless networks:
Wireless Security. The solution must protect against eavesdropping and unauthorized access. The solution may include encryption or other techniques to provide this assurance which the local school may turn on or off as local policy indicates. The Bidder must describe how its proposed solution will provide such protections.
Wireless Security. While we employ industry-leading security measures to protect your accounts, you understand that wireless communications may not always be secure and that there are risks in accessing the EFT Services with your mobile device. Subject to applicable law, you expressly agree to assume all such risks. You agree to exercise precautions to safeguard your wireless device, your identity, your accounts, and your account information. You agree never to provide your personal information or account information to any person or through any wireless network you do not know or whose identity you cannot verify. If you do, you assume all risks, subject to applicable law. We will never contact you by telephone, text messaging, email, or otherwise and ask you to provide us your personal or account information, including your Social Security number, username, PIN, and account numbers. You agree not to disclose your personal information and account information to unknown persons through those channels for any reason. You agree to remain vigilant for phishing and other fraudulent scams and notify us promptly if you become aware of or suspect fraudulent activity involving your identity, your accounts, or the Credit Union. If you receive a text or email that appears to have been sent by the Credit Union and asks for personal or account information or asks you to click on a link, do not respond to the text or email and notify us immediately. You agree to notify us immediately if you change your email address or other contact information. If you fail to exercise reasonable care to protect your identity and safeguard your mobile device and accounts, we will not be liable, subject to applicable law.
Wireless Security. If Market Logic deploys a wireless network, Market Logic will configure and maintain the use, configuration and management of wireless networks to meet the following:
Wireless Security. If you deploy a wireless network, you will configure and maintain the use, configuration and management of wireless networks to meet the following:
Wireless Security. When configuring Wireless Access Points (WAP) and devices, the organization shall change the following: [Core-15(b)] o Equipment administrator default password. o Vendor default encryption keys. o Encryption keys anytime anyone with knowledge of the keys leaves TSM or changes positions. o Default SNMP community strings on wireless devices. o Default passwords/passphrases on access points. o Other security-related wireless vendor defaults, if applicable. TSM shall monitor all authorized and unauthorized Wireless Access Points (WAP) to TSM information systems and networks. The installation of Wireless Access Points (WAP) is prohibited, unless explicitly authorized, in writing, by the Infrastructure Manager and the Information & Cyber Security Director. [Core-15(b) & Core-15(c)] Approved Wireless Access Points (WAP) and devices shall have appropriate encryption enabled for authentication and transmission and shall be placed in secure areas. [Core- 15(b)]
Wireless Security. We employ industry-leading security measures to protect your Accounts. The method you use to access mobile communications may not always be secure and there are risks in accessing EFT Services with your mobile device or computer on an open WIFI network. Subject to applicable law, you expressly agree to assume all such risks. You agree to: a. Exercise precautions to safeguard your mobile device, your identity, your Accounts, and your Account information. b. Never to use an open WIFI wireless network to log into your Online Banking or Mobile App. c. Not to disclose your personal and Account information to unknown persons or persons whose identity you cannot verify for any reason. d. Remain vigilant for phishing, scams, and fraud; notify us promptly if you become aware of or suspect fraudulent activity involving your identity, your Accounts, or the Credit Union. e. Inform us immediately if you change your email address, physical address, phone number or other contact information. Abilene Teachers Federal Credit Union staff will never contact you by telephone, text messaging, email, or otherwise and ask you to provide us your user name or PIN.