Additional Cloud Services Security Controls Sample Clauses

Additional Cloud Services Security Controls. Area Control(s) Data Protection (Availability Control, Transmission Control, Data Deletion) Failover Procedures. Citrix implements mechanisms designed to address loss of availability of Partner Personal Data, including storing copies of Partner Personal Data in a different place from where the primary computer equipment processing the Partner Personal Data is located. Data Beyond Boundaries. Citrix encrypts or enables Partner to encrypt Partner Personal Data that is transmitted over public networks that are part of a Service. Retention. Citrix may retain Partner Personal Data following the Service period and archiving for Partner access where required for legal purposes. Citrix will comply with the requirements of this Exhibit until such Partner Personal Data has been permanently deleted. Subject to Return directly below, Citrix is under no obligation to retain Partner Personal Data following termination of the Service. Return. Subject to availability and the applicable Services Description, Partner has thirty (30) days to download Partner Personal Data after expiration. Area Control(s) Data Deletion. Citrix will securely delete Partner Personal Data when no longer needed for a legitimate purpose. Secure operations Event Logging. In certain Services, Citrix collects Logs. Logs may include access ID, time, authorization granted or denied, diagnostic data such as trace and crash files, and other relevant activity. Logs are used (i) for providing, securing, managing, measuring and improving the Services and associated analytics, (ii) as directed or instructed by Partner and its Users, and/or (iii) for compliance with Citrix policies, applicable law, regulation, or governmental request. This may include monitoring the performance, stability, usage and security of the Services and related components. Partner may not block or interfere with this monitoring. Citrix may supplement Logs with information collected from third parties for the purposes specified above. Logs may be used for purposes not specified in this Exhibit only in aggregate form. Business Continuity and Disaster Recovery Back-ups. Except where otherwise noted in the respective Services Description, Services are maintained in high availability, active-active clusters spanning multiple physical sites. Systems not maintained in an active-active configuration are backed up according to the specific Service’s Service Level Goals.
AutoNDA by SimpleDocs
Additional Cloud Services Security Controls. Area Control(s) Data Protection (Availability Control, Transmission Control, Data Deletion) Failover Procedures. Citrix implements mechanisms designed to address loss of availability of Customer Content, including storing copies of Customer Content in a different place from where the primary computer equipment processing the Customer Content is located. Data Beyond Boundaries. Citrix encrypts or enables Customer to encrypt Customer Content that is transmitted over public networks that are part of a Service. Retention. Citrix may retain Customer Content following the Service period and archiving for customer access where required for legal purposes. Citrix will comply with the requirements of this Exhibit until such Customer Content has been permanently deleted. Subject to Return directly below, Citrix is under no obligation to retain Customer Content following termination of the Service. Return. Subject to availability and the applicable Services Description, Customer has thirty (30) days to download Customer Content after expiration. Data Deletion. Citrix will securely delete Customer Content when no longer needed for a legitimate purpose. Secure Operations Event Logging. In certain Services, Citrix collects Logs. Logs may include access ID, time, authorization granted or denied, diagnostic data such as trace and crash files, and other relevant activity. Logs are used (i) for providing, securing, managing, measuring and improving the Services and associated analytics, (ii) as directed or instructed by Customer and its Users, and/or (iii) for compliance with Citrix policies, applicable law, regulation, or governmental request. This may include monitoring the performance, stability, usage and security of the Services and related components. Customer may not block or interfere with this monitoring. Citrix may supplement Logs with information collected from third parties for the purposes specified above. Logs may be used for purposes not specified in this Exhibit only in aggregate form. Area Control(s) Business Continuity and Disaster Recovery Back-ups. Except where otherwise noted in the respective Services Description, Services are maintained in high availability, active-active clusters spanning multiple physical sites. Systems not maintained in an active-active configuration are backed up according to the specific Service’s Service Level Goals.

Related to Additional Cloud Services Security Controls

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Audit Controls P. Contractor agrees to an annual system security review by the County to assure that systems processing and/or storing Medi-Cal PII are secure. This includes audits and keeping records for a period of at least three (3) years. A routine procedure for system review to catch unauthorized access to Medi-Cal PII shall be established by the Contractor.

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • Monitoring Services IDT staff shall, using methods that include face-to-face and other contacts with the member, monitor the services a member receives. This monitoring shall ensure that:

  • Mobile Banking Services Mobile Banking is a personal financial information management service that allows you to access account information and conduct transactions using compatible and supported mobile phones and/or other compatible and supported wireless devices (including phones, "Wireless Devices"). We reserve the right to modify the scope of the Mobile Banking services at any time. We reserve the right to refuse to make any transaction you request through Mobile Banking. You agree and understand that Mobile Banking may not be accessible or may have limited utility over some mobile telephone networks, such as while roaming.

  • Management and Control Systems Grantee will:

  • Online Banking Services We may provide Online Banking Services to you during the Term from time to time as described in this Agreement. You understand and agree that we may, and you authorize us to, provide Online Banking Services through one or more third party vendors. This Agreement does not apply to services provided under separate agreements with third party vendors that do not specifically reference this Agreement or that are not specifically referenced in this Agreement. Please refer to the online help and instructions on how to use our Online Banking Services. Such instructions are part of this Agreement. Please note that during your use of Online Banking Services, we may provide you with additional requirements and limitations regarding the use of Online Banking Services through the system by which we may provide Online Banking Services. You agree to be bound by any and all such additional requirements and limitations. You also agree to be bound by any and all of our published policies and procedures, whether published on the Web Site, through the Online Banking Services, or otherwise. Any and all such policies and procedures shall be a part of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.