Application Control Sample Clauses

Application Control. 3.7.17.1 Application Control is provided by a 3rd Party Solution.
AutoNDA by SimpleDocs
Application Control. In order to ensure the protection of applications processing Data, the Supplier shall take reasonable steps to implement and maintain the following measures:
Application Control. This element of the Service Level Agreement addresses the issues of site availability and data integrity / disaster recovery. Service Element Service Commitment Site Availability The Service Provider will use commercially reasonable efforts to make the Site available with an Annual Uptime Percentage (defined below) of at least 99.95% during the Service Year. In the event the Service Provider does not meet the Annual Uptime Percentage commitment, you will be eligible to receive a Service Credit as described below. Data Back-up To ensure that user data is securely backed-up, SkipsoLabs will perform daily- automated back-ups of the entire member data in order to provide the Client with the peace of mind that their member data is securely stored. End of Contract Data Transfer In the event the Services Agreement is terminated, the Service Provider will provide Client with key data from the application (User Data, Submissions, Content) in exportable cvs format or in other pre-defined format. Alternatively, the Client can agree to retain the data on the Service Provider’s system at the minimum recurring monthly fee.
Application Control. This service allows Customers to identify and control applications on networks and endpoints regardless of port, protocol, and IP address used. It gives you unmatched visibility and control over application traffic, even unknown applications from unknown sources and inspects encrypted application traffic. Following identification and decryption, application traffic is either blocked, or allowed and scanned for malicious payloads. In addition, application control protocol decoders detect and decrypt tunnelled IPsec VPN and SSL VPN traffic prior to inspection, ensuring total network visibility. Application control even decrypts and inspects traffic using encrypted communications protocols, such as HTTPS, POP3S, SMTPS and IMAPS. A maximum of 10 application control profiles can be implemented as part of the ICON Secure Service, and with 2 global custom rating override categories (Allow & Block). Maintel will provide support to the customer on this service to ensure best practise deployment and usage of implemented policies, day to day management will be the responsibility of the customer This Service is eligible to Deep Packet Inspection. See paragraph 7.10 of this Schedule 5.

Related to Application Control

  • Application Procedure 7.4.1. Application Priority........................................ 7.4.2. [Reserved].................................................. 7.4.3. Advance Payments............................................

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!