Common use of Build and Maintain a Secure Network Clause in Contracts

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services, and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point. systems (port scanning, virus scanning, vulnerability scanning).

Appears in 6 contracts

Samples: Service Agreement, Service Agreement, Service Agreement

AutoNDA by SimpleDocs

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services, services and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point. systems (port scanning, virus scanning, vulnerability scanning).

Appears in 5 contracts

Samples: Mortgage Agreement, Customer Subscriber's Service Agreement, NHRC Member Agency Agreement

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services, services and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses addresses on Wireless wireless access points and restrict authentication on the configuration of the access point. systems (port scanning, virus scanning, vulnerability scanning).

Appears in 1 contract

Samples: Credit Report Agreement

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services, and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point. systems (port scanning, virus scanning, vulnerability scanning).

Appears in 1 contract

Samples: Landlord Subscriber Agreement

AutoNDA by SimpleDocs

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop desktop. Firewall deployed that is installed and configured to block unnecessary/unused ports, services, services and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point. systems (port scanning, virus scanning, vulnerability scanning).

Appears in 1 contract

Samples: Subscriber Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!