NextiraOne, LLC d/b/a Black Box Network Services
|
|
|
- Vincent Logan
- 10 years ago
- Views:
Transcription
1 NextiraOne, LLC d/b/a Black Box Network Services Black Box Network Services Additional Terms and Conditions Managed Services ( Additional Terms ) applicable to furnishing of equipment and services within the U.S. operating territory of NextiraOne, LLC d/b/a Black Box Network Services and its subsidiaries 1.0 PRODUCT AND SERVICES 1.1 Product Description. In addition to the General Terms and Conditions set forth at ( ) ( General Terms ), these Additional Terms for Managed Services, as identified herein, set forth the supplementary legal rights and obligations governing Customer orders for the purchase of Black Box Network Services Managed Services. 1.2 Black Box Network Services Managed Services. Black Box Network Services provides Managed Services in the following areas: Configuration Management, Fault Management, Performance Management and Security Management. These Managed Services offerings are described in the Customer selected Service Plans posted at ( ) Planning and Design. Planning and Design consists of the following service offerings: VoiceScan This Managed Service provides a review of all security settings based on Black Box Network Services defined best practices but it does not guarantee that fraudulent use or exploitation of a specific vulnerability will not occur Voice Audit This Managed Service provides an audit and documentation service for Nortel Networks Meridian PBX, Succession CSE 1000 and voic systems. This Service does not provide configuration information for other peripheral applications attached to the identified products Configuration Management. Configuration Management consists of the following service offerings: VoiceGuard This Managed Service option provides scheduled configuration backup of the Customer s telephony platform and will provide delivery of the most recent backup to facilitate restoration of the telephony system configuration but cannot guarantee that all changes will be reflected in the restored configuration. This Service does not include reconstruction of the affected system Customer Technical Assistance This Managed Service provides an escalation point to which a customer help desk and/or telephony system administrator may escalate telephony application usage questions. This Service is not intended to be delivered to Customer s End Users. This Service is based upon a rate of consumption basis which will be subject to quarterly review NetVision Performance and Configuration This Managed Service produces reports and implements changes as directed by the Customer. While Black Box Network Services has detailed technical experience with the supported products and will make every effort to ensure changes do not impact System operation, Black Box Network Services makes no guarantee that Customer directed changes will deliver expected results Managed Software Update This Managed Service provides quarterly Software updates to maintain the Customer System at the latest vendor provided Software release level. Customer must provide Black Box Network Services a copy of the Customer s internal change control policy for compliance purposes. Customer must also have the appropriate vendor Software support plan.
2 Configuration Backup/Restore This Managed Service option provides scheduled backup of system configuration files and will provide delivery of the most recent backup to facilitate restoration of an application configuration but cannot guarantee full user data recovery. This Service does not include reconstruction of the affected System Fault Management. Fault Management consists of the following service offerings: NetVision Fault Management This Managed Service provides proactive monitoring, problem isolation, resolution, and escalation, if required, for communications systems but does not provide any guaranty that service disruptions will not occur NetVision Alarm Notification This Managed Service provides proactive monitoring and electronic Customer notification of specific communications system events but does not provide any problem isolation, resolution, escalation, or confirmation that any notification has been received NetVision Remote Diagnostics This Managed Service provides proactive monitoring, problem isolation, electronic notification, and human notification for communications systems but does not provide and actual repair activities which are the responsibility of the notified party Designated Technical Engineer This Managed Service provides a primary and secondary engineer to whom all support requests are directed. Requests for support continue to be coordinated through Black Box Network Services call receipt team. If agreed service level commitments become at risk due to non-availability of the designated resources, an alternative resource may be engaged to deliver the required support TAC Serve This Managed Service provides a non-maintenance Customer with vendor certified technicians with direct 800 number access to Black Box Network Services engineers resident in the Technical Assistance Center. The Service is limited to twelve (12) calls per a twelve (12) month period and all calls must be placed by a properly certified technician. Escalation to the product vendor will be provided only if the Customer has an appropriate support contract in place. A separate agreement will be required for each technology supported. This Service does not guarantee that the identified issue will be resolved TAC Direct This Managed Service provides a maintenance Customer with vendor certified technicians with direct 800 number access to Black Box Network Services engineers resident in the Technical Assistance Center. The service is limited to twentyfive (25) calls per a twelve (12) month period and all calls must be placed by a properly certified technician Performance Management. Performance Management consists of the following service offerings: Traffic Study This Managed Service provides a one-time snapshot view of the voice system performance, console performance, and trunking adequacy for the telephony or messaging system. This Service does not guarantee that the System will always perform without disruption or the installation of additional capacity NetVision Performance Management This Managed Service monitors and generates reports for network elements and interfaces to the local and wide area networks. This Service provides defined responses to specific performance events but does not guarantee that service congestion will be prevented Managed Security. Managed Security consists of the following service offerings: Managed Firewall Solution This Managed Service provides Fault Management of the Firewall technology and optionally provides analysis of penetration attempts and recommended rules enhancement. Firewall technology in itself is not foolproof and no firewall technology provides an absolute deterrent or barrier to unauthorized entry. This Managed Service does not guarantee that a penetration will not occur.
3 Managed Intrusion Detection Solution This Managed Service provides Fault Management of the Intrusion Detection technology and optionally provides signature file updates and analysis of intrusion logs to enhance protection of the network. This Managed Service does not guarantee that an intrusion will not occur or that all intrusion attempts will be detected Managed Virtual Private Network ( VPN ) Help Desk This Managed Service provides 7 x 24 end user support for Customer networks. Customer must provide authentication service. In addition, Customers who do not select the Managed Firewall Solution with its VPN acknowledge and understand that World Wide Web ( www ) access may result in unsecured access to the Customer s company network Managed Vulnerability Protection This Managed Service provides recurring analysis of select known system vulnerabilities to identify targeted systems that might be exploited by known threats. This Service identifies the vulnerability but does not guarantee that a vulnerability will not be exploited, nor does it guaranty that a new threat will be avoided Network Vulnerability Scan This Managed Service provides a snapshot analysis of select known system vulnerabilities and documents those that are identified to exist. This Service does not guaranty that a new threat will be created nor does it guarantee that implementation of recommended remedial actions will prevent any future exploitation Managed Anti-Virus Update This Managed Service provides a private network based location from which supported telephony servers on customer networks may retrieve the latest signature files. The anti-virus update procedures followed are consistent with current service specifications provided by the product vendors. Black Box Network Services does not guarantee that a virus-induced problem will not occur nor does Black Box Network Services guarantee that the vendor defined specifications will fail safe Penetration Testing Penetration testing is a snapshot view of whether or not target system are adequately configured to prevent unauthorized access. This Managed Service does not guarantee that unauthorized access will be prevented in the future Consolidated Services. Consolidated Services packages consist of the following: ConvergenceCare This Managed Service provides basic NetVision Fault Management Service for Internet Protocol based telephony systems as well as selectable Managed Services. The level of support delivered is specifically subject to the options selected by the Customer. While Black Box Network Services makes every effort to ensure telephony services are not disrupted, this Service does not guarantee that disruptions will not occur nor does it guarantee the quality of the transported voice communications Contact Center Care This Managed Service provides basic NetVision Fault Management Service for server based contact center systems as well as selected Managed Services. The level of support delivered is specifically subject to the options selected by the Customer. While Black Box Network Services makes every effort to ensure operations disruptions do not occur, this Service does not guarantee that disruptions will not occur nor does it guarantee the performance of the application. 2.0 DEFINITIONS 2.1 Capitalized terms not otherwise defined herein shall have the meaning given them in the General Terms and selected Service Plans. 3.0 LIMITED WARRANTIES FOR MANAGED SERVICES 3.1 BLACK BOX NETWORK SERVICES WARRANTS THAT INSTALLATION OF SYSTEMS WILL BE PERFORMED IN A GOOD AND WORKMANLIKE MANNER AND SHALL BE LIMITED TO THE CORRECTION OF ANY SERVICES FOR WHICH BLACK BOX NETWORK SERVICES RECEIVES WRITTEN NOTICE OF NONCONFORMANCE HEREUNDER WITHIN THIRTY (30) DAYS FOLLOWING THE DATE OF COMPLETION OF THE SERVICES. THE WARRANTY EXCLUSIONS SET FORTH IN THE GENERAL TERMS SHALL BE APPLICABLE HERETO.
4 3.2 THE WARRANTIES PROVIDED BY THIS SECTION 3 ARE IN LIEU OF ALL OTHER EXPRESS WARRANTIES AND IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES OF NONINFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. BLACK BOX NETWORK SERVICES DISCLAIMS ANY WARRANTY OF SECURITY, TO PREVENT UNAUTHORIZED USE OF, OR INTRUSION INTO THE SYSTEM, INCLUDING BUT NOT LIMITED TO LOSS OF DATA AND TOLL FRAUD OR COMPUTER VIRUSES OR THAT THE SERVICES OR NETWORK TRANSPORT WILL BE UNINTERRUPTED OR ERROR FREE. 3.3 Black Box Network Services makes no warranty that the Managed Services will be uninterrupted or error-free. Customer acknowledges, and agrees to inform its end users, that the Managed Services are not a guaranty against malicious code, deleterious routines, and other techniques and tools employed by computer hackers and other third parties to create security exposures. BLACK BOX NETWORK SERVICES MAKES NO WARRANTY, EXPRESS OR IMPLIED, THAT ALL SECURITY THREATS AND VULNERABILITIES WILL BE DETECTED OR THAT THE SERVICES WILL RENDER A CUSTOMER S OR END USER S NETWORK AND COMPUTER SYSTEMS SAFE FROM INTRUSIONS AND OTHER SECURITY BREACHES. 3.4 Black Box Network Services shall have no liability for any warranty provided by the manufacturer to Customer and any such Equipment and/or Software claims will be passed through to the manufacturer. 4.0 MANAGED SERVICES TERM 4.1 For Managed Services Requiring Persistent Access Only. Where the parties require data network connectivity through a persistent network connection, whether Virtual Private Network ( VPN ) or carrier provided point-to-point connection, and seek to insure security of the persistent connection and all information and data to which either party may have access, each party shall use reasonable commercial efforts to provide the other party Access (as defined herein) to the systems via a persistent connection twenty-four (24) hours a day, seven (7) days per week. Access to the systems may be provided directly or through any third party service provider ( Provider ) with which either party may contract. The parties further acknowledge that any rights or licenses associated with such Provider shall be directly between such Provider and the applicable party. Each party shall be responsible for the costs of any Provider with which it contracts, unless specifically set forth herein. Each party shall be liable for the acts or omissions of its Provider during the course of systems Access; provided, that if both parties use the same Provider to effect such Access, the initiating party shall be liable for the acts or omissions of such Provider as to such Access. Systems Access is to be used only for the purposes outlined in this Agreement or as otherwise mutually agreed to in writing by the parties. Each of Black Box Network Services and Customer s users who Access the systems assume personal responsibility for appropriate use and agrees to comply with this Agreement and any other applicable policies and guidelines, as well as applicable city, state and federal laws and regulations. For the purposes of this provision, the term Access shall mean to use, instruct, communicate with, store data in, receive or intercept data from or otherwise utilize any services of the other party s system. 5.0 MANAGED SERVICES TERM 5.1 Black Box Network Services will provide Managed Services for the term defined on an executed Order Form and in accordance with the terms of the applicable Service Plan. 6.0 LIMITATION OF LIAB ILITY 6.1 Customer understands that, should it make any changes to its firewall or VPN equipment or Managed Services outside the scope of the selected Managed Services Service Plan(s), that such changes may result in a lower level of security and may allow unsecured access to its network. In the event of any such change(s), Customer acknowledges and agrees that it shall assume all risks and liabilities associated with or resulting from any such change(s).
5 6.2 CUSTOMER ACKNOWLEDGES THAT DATA TRANSMISSION SECURITY SERVICES SUCH AS THOSE PROVIDED UNDER THIS AGREEMENT ARE NOT FOOLPROOF AND, THEREFORE, ARE NOT GUARANTEED. IN ADDITION TO THE DISCLAIMERS AND LIMITATIONS OF LIABILITY SET FORTH IN THE AGREEMENT, NEITHER BLACK BOX NETWORK SERVICES NOR ITS SUPPLIERS WILL BE LIABLE FOR ANY DAMAGES (INCLUDING, WITHOUT LIMITATION, ANY LOSS OR DAMAGE TO DATA) RELATING TO OR ARISING FROM THE USE OF THE MANAGED SERVICES PROVIDED HEREUNDER.
TELECOM/CONVERGED SERVICESELECT SM
ESSENTIAL SELECT STANDARD FEATURES Emergency outage calls 2-hour response time, Monday -Friday, 8:00 a.m. - 5:00 p.m., site local time, excluding NextiraOne holidays and Manufacturer holidays Routine service
XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services
1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking
Chambers Bank Business Internet Banking Agreement
Chambers Bank Business Internet Banking Agreement 1. INTRODUCTION. Chambers Bank Business Online Banking is a banking and information service that allows its Business Banking clients, via the Internet,
SERVICE LEVEL AGREEMENT. Open Source Support Desk B.V. Hargray, Inc.
SERVICE LEVEL AGREEMENT between Open Source Support Desk B.V. and Hargray, Inc. Copyright 2011 by Open Source Support Desk B.V. All rights reserved. This document is protected by copyright. No part of
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
SecureWatch PLUS Service Description and Agreement
SecureWatch PLUS Service Description and Agreement This SecureWatch PLUS Service Description and Agreement ( Agreement ) is made effective as of the Effective Date (defined below) by and between Corero
Dell Advanced Network Monitoring Services Service Description
Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
SYSTEM SOFTWARE AND OR HARDWARE SUPPORT SERVICES (PREMIUM 24x7)
SYSTEM SOFTWARE AND OR HARDWARE SUPPORT SERVICES (PREMIUM 24x7) These System Software and or Hardware System Support Services terms and conditions ( Terms and Conditions ) apply to any quote, order, order
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Spambrella SaaS Support Terms & Conditions
April 29, 2014 Spambrella SaaS Support Terms & Conditions Spambrella and/or other noted Spambrella related products contained herein are registered trademarks or trademarks of Spambrella and/or its affiliates
Description of Services, Target Response Times and Customer Responsibilities:
MAINTENANCE AND SUPPORT SERVICE TERMS CloudShield s products are initially offered with a basic Standard Warranty when shipped from CloudShield. Standard Warranty provides that the (a) CloudShield Hardware
Support Plan Terms and Conditions
Support Plan Terms and Conditions 1) SOFTWARE WARRANTY: A. AVST represents and warrants that all replacement parts or other software or equipment supplied under this Plan will perform substantially in
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
SKC MANAGED SERVICES TERMS OF USE
SKC MANAGED SERVICES TERMS OF USE 1. Access to Customer Network (last updated August 06, 2015) SKC s ability to access the Customer s network is essential to successful SKC Managed Services fulfillment.
ONESECURE MANAGED SECURITY SERVICES ADDENDUM AND SERVICE LEVEL AGREEMENT
ONESECURE MANAGED SECURITY SERVICES ADDENDUM AND SERVICE LEVEL AGREEMENT This addendum (the Addendum ), dated this day of 20, amends the Telecommunications Account Agreement (the TAA ), dated,20 entered
IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
Hosting Agreement. WHEREAS, Lanex is a software development and hosting firm that offers design, programming and hosting services; and
Hosting Agreement This Hosting Agreement ( Agreement ) comprises the terms and conditions that govern the provision of the hosting services, as defined below, to the clients ( Client ) of Lanex, LLC, with
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Reference Architecture: Enterprise Security For The Cloud
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
HP Hardware Technical Support
HP Hardware Technical Support HP Technology Services - Contractual Services Technical data HP Hardware Technical Support service provides a remote hardware telephone support service on selected HP and
Terms of Service MANAGED FIREWALL Service
This Service is subject to and governed by Customer s separate signed master services agreement with CTS. This Agreement is entered into between you and CTS for the provision of CTS Managed Firewall Services.
Northshore Micro L.L.C 1922-A Corporate Square Blvd Slidell, LA 70458 Voice: (985) 231-0272 or (504) 342-4858 - FAX: (504) 273-5061
Northshore Micro L.L.C 1922-A Corporate Square Blvd Slidell, LA 70458 Voice: (985) 231-0272 or (504) 342-4858 - FAX: (504) 273-5061 Email: [email protected] - Web: http://www.northshoremicro.com
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Reporting and Incident Management for Firewalls
Reporting and Incident Management for Firewalls The keys to unlocking your firewall s secrets Contents White Paper November 8, 2001 The Role Of The Firewall In Network Security... 2 Firewall Activity Reporting
Revised 10/13 SUBSCRIBER AGREEMENT. Introduction
SUBSCRIBER AGREEMENT Introduction This Agreement (the "Agreement") sets forth the terms and conditions under which Consolidated Companies, Inc., together with any affiliate and/or distribution partner
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
Overview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades.
Software Maintenance & Support Agreement This agreement ( Support Agreement, Software Assurance, Agreement ) is for the purpose of defining the terms and conditions under which Technical Support, Maintenance
XO HOSTED SECURITY VPN SERVICES
XO HOSTED SECURITY VPN SERVICES 1.0 Products and Services 1.1 Product Description. XO Hosted Security VPN (the Service ) is an optional suite of services, which may be added to a Customer s XO MPLS Network.
Frequently Asked Questions
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
MCC TERMS AND CONITIONS
MCC TERMS AND CONITIONS Welcome to MNCred.org, which is owned by Minnesota Credentialing Collaborative, LLC ( we, us or MCC ) a joint effort of the Minnesota Council of Health Plans (MCHP), Minnesota Hospital
QAD CLOUD EDI PROGRAM DOCUMENT
QAD CLOUD EDI POGAM DOCUMENT This QAD Cloud EDI Program Document establishes terms and conditions for Cloud Services ordered by Customer and provided by Vendor under an Order Document executed under a
MTN Managed Firewall. Description of Service
MTN Managed Firewall Description of Service Managed Firewall ("Service") is a managed security service for Internet access customers that provides firewall configuration, administration, monitoring, support
SOFTWARE UPDATE SERVICES (SUS)
SOFTWARE UPDATE SERVICES (SUS) These Software Update Services terms and conditions ( Terms and Conditions ) apply to any quote, order, order acknowledgment, and invoice, and any sale or provision of Software
SERVICE CONTRACT. and
SAMPLE SERVICE CONTRACT SERVICE CONTRACT BETWEEN and VOICE PRODUCTS SERVICE, LLC Regarding the maintenance of Equipment installed at: VOICE PRODUCTS SERVICE, LLC 8555 East 32 nd Street North Wichita, KS
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Terms and Conditions- OnAER Remote Monitoring Service
Terms and Conditions- OnAER Remote Monitoring Service TERMS OF SERVICE Please read these terms of user ( Agreement or Terms of Service ) carefully before using the services offered by AERCO International,
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
AriesoGEO Support Services Terms and Conditions (12x5)
AriesoGEO Support Services Terms and Conditions (12x5) These Standard Support Services terms and conditions ( Terms and Conditions ) apply to any quote, order, order acknowledgment, and invoice, and any
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
Service Description: Dell Backup and Recovery Cloud Storage
Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
BlackBerry Mobile Voice System
BlackBerry Mobile Voice System Mobile Unified Communications BlackBerry Mobile Voice System (BlackBerry MVS) brings desk phone features to BlackBerry smartphones. Work with one business number at the office
SAS 70 Type II Audits
Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls
Ancero SIP Trunking Service Guide
Ancero SIP Trunking Service Guide Contents Service Overview... 4 Use of Service and Ancero provided Device... 4 Use of Service only... 4 Prohibited Uses... 4 Use of Service and Device by Customers Outside
How To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Managed Services Agreement
The Agreement This Agreement between Client and the Service Provider Business Technology Centre, is effective upon the date signed, and shall remain in force for a period from To Company Trading ABN/ACN
Zurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
Kinetic Internet Limited
Kinetic Internet Limited Company No: 4470080 ADDENDUM Dedicated Server Terms and Conditions KINETIC INTERNET is an International Communications company that provides Dedicated Server services. The customer
Enterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
Commercial Internet Banking Agreement and Disclosures
Rev. 4/2015 Commercial Internet Banking Agreement and Disclosures 1. Coverage. This Agreement applies to your use of our commercial Internet Banking Service, which permits you to access your accounts with
BUSINESS TRUNKING TERMS & CONDITIONS
BUSINESS TRUNKING TERMS & CONDITIONS This Agreement commences on the day of, 20. In this Agreement, the terms You and Your / the Customer will be used to refer to [ ] (the Customer and the terms FLOW,
Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
Statement of Service Enterprise Services - AID Microsoft IIS
Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
Multiple Managed Services Agreement
Multiple Managed Services Agreement Last Updated: February 2015 Managed Services Terms and Conditions Page 2 Managed Firewall Agreement 1. Firewall and Virtual Private Network Services ( Managed Security
Teleflora Managed Services Agreement
Teleflora Managed Services Agreement Page 1 of 6 This Teleflora Managed Services Agreement (this "Agreement") is entered into as of the Effective Date set forth below between Teleflora LLC ("Teleflora")
Software Hosting and End-User License Subscription Agreement
Software Hosting and End-User License Subscription Agreement (Last Updated October 31, 2015) IMPORTANT! The Contrail software (the "SOFTWARE") that you seek to use was developed by OneRain Incorporated
Managed Services Terms and Conditions
Managed Services Terms and Conditions These Managed Services Terms and Conditions ( Managed Services Terms ) set forth the terms and conditions pursuant to which PTC provides Managed Services to paid subscribers
Service Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services.
Service Description: Cisco Prime Home Hosted Services This document describes the Cisco Prime Home Hosted Services. Related Documents: The following documents also posted at www.cisco.com/go/servicedescriptions/
Rollstone Bank & Trust Business Online Bill Pay Agreement
Rollstone Bank & Trust Business Online Bill Pay Agreement By choosing to use the Rollstone Bank & Trust Online Bill Pay, you agree to the terms and conditions in this Agreement. Please read this Agreement
VoIP SERVICES ADDITIONAL TERMS AND CONDITIONS OF SERVICE
VoIP SERVICES ADDITIONAL TERMS AND CONDITIONS OF SERVICE These VoIP Services Additional Terms and Conditions of Service (these VoIP Terms of Service ) state important requirements regarding the use of
STANLEY HEALTHCARE SUPPORT POLICY
STANLEY HEALTHCARE SUPPORT POLICY The following describes the Support which Stanley Healthcare or an authorized Stanley Healthcare third party partner (collectively Stanley Healthcare ) provides to Buyer
Managed Internet Access Agreement
Managed Internet Access Agreement THIS AGREEMENT is made and entered into this 1st day of July, 2016, by and between TEK-HUT, INC., an Idaho corporation ("Tek-Hut") and Kimberly School District, ("Customer").
SUBSCRIBER AGREEMENT Comodo LivePCSupport
SUBSCRIBER AGREEMENT Comodo LivePCSupport THIS AGREEMENT CONTAINS A BINDING ARBITRATION CLAUSE. PLEASE READ THE AGREEMENT CAREFULLY BEFORE ACCEPTING THE TERMS AND CONDITIONS. IMPORTANT PLEASE READ THESE
Schedule Document. Leased Lines & Ethernet Based Services. Node4 Limited 29/11/2007
Schedule Document Leased Lines & Ethernet Based Services Node4 Limited 9//007 SCHEDULE Additional terms, Service Description & Service Level Agreement for Leased Lines & Ethernet Based Services. SERVICE
ATM END-POINT PROTECTION MONITORING
ATM END-POINT PROTECTION MONITORING GENERAL PROVISION Service Activation. To activate the ATM End-Point Protection Monitoring Service it may be necessary to install hardware and/or software components.
By using the Cloud Service, Customer agrees to be bound by this Agreement. If you do not agree to this Agreement, do not use the Cloud Service.
1/9 CLOUD SERVICE AGREEMENT (hereinafter Agreement ) 1. THIS AGREEMENT This Cloud Service Agreement ("Agreement") is a binding legal document between Deveo and you, which explains your rights and obligations
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
COMPUTER SERVICES AGREEMENT
COMPUTER SERVICES AGREEMENT This COMPUTER SERVICES AGREEMENT ( "Agreement") is made and entered into effective as of the 1 day of January, 2008 (the Effective Date ), by and between 3T Productions, Inc.,
BILLING & COLLECTIONS SERVICES STATEMENT OF GENERALLY AVAILABLE TERMS AND CONDITIONS
BILLING & COLLECTIONS SERVICES STATEMENT OF GENERALLY AVAILABLE TERMS AND CONDITIONS Description of Service This Statement of Generally Available Terms and Conditions ( Statement ) provides details under
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
Overcoming PCI Compliance Challenges
Overcoming PCI Compliance Challenges Randy Rosenbaum - Security Services Exec. Alert Logic, CPISM Brian Anderson - Product Manager, Security Services, SunGard AS www.sungardas.com Goal: Understand the
Bank of Denver Mobile Deposit User Agreement ( Agreement ):
This Agreement contains the terms and conditions for the use of BANK OF DENVER Mobile Deposit, and/or other remote deposit capture services that BANK OF DENVER or its affiliates ( BANK OF DENVER, us, or
