Client Security Sample Clauses

Client Security. 5.1 IBs must not:
AutoNDA by SimpleDocs
Client Security. Patching of security vulnerabilities to the operating system and software must meet or exceed the service level interval defined by the vendor for the threat level of the vulnerability. • Clients must have Malware protection with automatic signature updates. • Systems located in an unsecured area and attached to the Supplier network must not accesssystems and network segments containing Confidential Information. • All client systems that access Confidential Information, whether in use or not, must be physically secured. • Client systems which access Confidential Information from secured locations must have a passwordprotected screen saver or automated logoff after no more than 15 minutes of inactivity of account access. This includes any third-party vendors that may contract with those vendorsand have privileged access as well.
Client Security. The Client agrees to provide security in the amount described in item 14) of Schedule A and issued by an institution and in a form which is acceptable to GT (acting reasonably) and its respective banks or financiers.
Client Security. NYLAG will continue to work with the landlord to maintain and refine protocols concerning front desk security issues such as clients with identification issues, including the following:
Client Security. 7.1 The Client warrants that all cash, securities or other assets of any nature transferred to or held by Platform Securities, its nominees and custodians for the Client are the sole and beneficial property of the Client and are free and clear of any interest, charge or other encumbrance and will not charge, assign or otherwise dispose of or create any interest therein.
Client Security. Patching of security vulnerabilities to the operating system and software must meet or exceed the service level interval defined by the vendor for the threat level of the vulnerability. Clients must have Malware protection with automatic signature updates. Systems located in an unsecured area and attached to the Supplier network must not access systems and network segments containing confidential data. All client systems that access confidential data, whether in use or not, must be physically secured. Client systems which access confidential data from secured locations must have a password protected screen saver or automated logoff after no more than 15 minutes of inactivity of account access. This includes any third-party vendors that may contract with those vendors and have privileged access as well. Firewall Setup Network segments connected to the Internet must be protected by a firewall and configured to secure all devices behind it. All system security and event logs are reviewed regularly for anomalies, and available to McAfee Enterprise in the event of an incident. Unused ports and protocols must be disabled. Firewalls must be configured to prevent address spoofing. Only TCP ports should be used for web applications. Supplier firewalls must be configured to allow McAfee Enterprise scanning of McAfee Enterprise Web applications. McAfee Enterprise scanning source IP addresses will be provided to Suppliers. Data Security
AutoNDA by SimpleDocs
Client Security. ▪ Patching of security vulnerabilities to the operating system and software must meet or exceed the service level interval defined by the vendor for the threat level of the vulnerability. ▪ Clients must have Malware protection with automatic signature updates. ▪ Systems located in an unsecured area and attached to the Supplier network must not access systems and network segments containing confidential data. ▪ All client systems that access confidential data, whether in use or not, must be physically secured. ▪ Client systems which access confidential data from secured locations must have a password protected screen saver or automated logoff after no more than 15 minutes of inactivity of account access. This includes any third-party vendors that may contract with those vendors and have privileged access as well.
Client Security. Requirements The service requirements, functions, security features and other requirements set forth in Subsections A. through F. above, inclusive, shall be referred to singularly or collectively as the “Client Security Requirements.”
Client Security. Client shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Services, and (b) control the content and use of Client Data, including the uploading or other provision of Client Data for processing by the Services.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!