Your Network Security Obligations Sample Clauses

The "Your Network Security Obligations" clause defines the responsibilities of a party—typically the customer or user—in maintaining adequate security measures for their own networks and systems when accessing or using a service. This clause often requires the party to implement safeguards such as firewalls, antivirus software, and secure passwords, and to promptly address any vulnerabilities or breaches. Its core practical function is to allocate responsibility for network security, ensuring that each party takes appropriate steps to protect their own infrastructure and reducing the risk of unauthorized access or data breaches that could impact both parties.
Your Network Security Obligations. You understand that the use of the Services requires a network firewall at Your premises. You must deploy firewalls at each physical site designed to enhance security for SIP‐based VoIP applications and services. You are also responsible for implementing other security practices that conform with industry standards and best practices applicable to Your business and industry sector. You are responsible for all fraudulent use of Your Services without regard to how it occurs. See Section 4.4(d) of this Schedule. YOU HEREBY INDEMNIFY THE VOICE TELCO SERVICES PARTIES AGAINST ANY RESPONSIBILITY FOR DAMAGES, CONSEQUENTIAL OR OTHERWISE THAT ARISE FROM AN UNPROTECTED NETWORK.
Your Network Security Obligations. You understand that the use of the Services requires a network firewall at Your premises. You must deploy firewalls at each physical site designed to enhance security for the Services. You are also responsible for implementing other security practices that conform with industry standards and best practices applicable to Your business and industry sector. You are responsible for all fraudulent use of Your Services without regard to how it occurs. See Section 3.4(c) of this Schedule. YOU HEREBY INDEMNIFY THE COMPANY PARTIES AGAINST ANY RESPONSIBILITY FOR DAMAGES, CONSEQUENTIAL OR OTHERWISE, THAT ARISE FROM THE FAILURE BY YOU OR ANY THIRD PARTY TO PROPERLY PROTECT ANY NETWORK. For the Hybrid BRIDGE Service, specific security- related ports and protocols will be required to make the SIP tie trunk operational, and it is Your sole responsibility ensure that such ports and protocols are provisioned in accordance with applicable network requirements.
Your Network Security Obligations. You understand that the use of the Services requires a network firewall at Your premises. You must deploy firewalls at each physical site designed to enhance security for SIP-based VoIP applications and services. You are also responsible for implementing other security practices that conform with industry standards and best practices applicable to Your business and industry sector. You are responsible for all fraudulent use of Your Services without regard to how it occurs. See Section 4.4(c) of this Schedule. YOU HEREBY INDEMNIFY THE VOICE TELCO PARTIES AGAINST ANY RESPONSIBILITY FOR DAMAGES, CONSEQUENTIAL OR OTHERWISE, THAT ARISE FROM THE FAILURE BY YOU OR ANY THIRD PARTY TO PROPERLY PROTECT ANY NETWORK.
Your Network Security Obligations. You are responsible for implementing security practices that conform with industry standards and best practices applicable to Your business and industry sector (additionally enhanced to support SIP-based VoIP applications and services). You are responsible for all fraudulent use of Your HVS Services without regard to how it occurs. YOU HEREBY INDEMNIFY THE VOICE TELCO PARTIES AGAINST ANY RESPONSIBILITY FOR DAMAGES, CONSEQUENTIAL OR OTHERWISE, THAT ARISE FROM THE FAILURE BY YOU OR ANY THIRD PARTY TO PROPERLY PROTECT ANY NETWORK.
Your Network Security Obligations. You are responsible for implementing security practices that conform with industry standards and best practices applicable to Your business and industry sector. You are responsible for all fraudulent use of Your Services without regard to how it occurs. YOU HEREBY INDEMNIFY INTERMEDIA AND ITS AFFILIATES AGAINST ANY RESPONSIBILITY FOR DAMAGES, CONSEQUENTIAL OR OTHERWISE, THAT ARISE FROM THE FAILURE BY YOU OR ANY THIRD PARTY TO PROPERLY PROTECT ANY NETWORK.

Related to Your Network Security Obligations

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Operator’s Security Contact Information ▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Named Security Contact ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇.▇▇▇ Email of Security Contact (▇▇▇) ▇▇▇-▇▇▇▇ Phone Number of Security Contact

  • Guarantee and Security Agreement The Guarantee and Security Agreement, duly executed and delivered by each of the parties to the Guarantee and Security Agreement.

  • Collateral and Security Section 10.01.