Common use of Communications and Operations Management Clause in Contracts

Communications and Operations Management. The IT organization manages changes to the corporate infrastructure, systems and applications through a centralized change management program, which may include, testing, business impact analysis and management approval, where appropriate. Incident response procedures exist for security and data protection incidents, which may include incident analysis, containment, response, remediation, reporting and the return to normal operations. To protect against malicious use of assets and malicious software, additional controls may be implemented, based on risk. Such controls may include, but are not limited to, information security practices and standards; restricted access; designated development and test environments; virus detection on servers, desktops and notebooks; virus email attachment scanning; system compliance scans; intrusion prevention monitoring and response; logging and alerting on key events; information handling procedures based on data type, e-commerce application and network security; and system and application vulnerability scanning.

Appears in 18 contracts

Samples: Reseller Terms of Sale, Reseller Terms of Sale, Reseller Terms of Sale

AutoNDA by SimpleDocs

Communications and Operations Management. The IT organization manages changes to the corporate infrastructure, systems and applications through a centralized change management program, program which may include, include testing, business impact analysis and management approval, approval where appropriate. Incident response procedures exist for security and data protection incidents, incidents which may include incident analysis, containment, response, remediation, reporting and the return to normal operations. To protect against malicious use of assets and malicious software, additional controls may be implemented, implemented based on risk. Such controls may include, but are not limited to, information security practices policies and standards; , restricted access; , designated development and test environments; , virus detection on servers, desktops desktop and notebooks; virus email attachment scanning; system compliance scans; , intrusion prevention monitoring and response; , logging and alerting on key events; , information handling procedures based on data type, e-commerce application and network security; , and system and application vulnerability scanning.

Appears in 2 contracts

Samples: MSSP Addendum for Saas Solutions, MSSP Addendum for Saas Solutions

Communications and Operations Management. The IT organization manages changes to the corporate infrastructure, systems and applications through a centralized change management program, which may include, testing, business impact analysis and management approval, approval where appropriate. Incident response procedures exist for security and data protection incidents, which may include incident analysis, containment, response, remediation, reporting and the return to normal operations. To protect against malicious use of assets and malicious software, additional controls may be implemented, implemented based on risk. Such controls may include, but are not limited to, information security practices policies and standards; , restricted access; , designated development and test environments; , virus detection on servers, desktops desktop and notebooks; virus email attachment scanning; system compliance scans; , intrusion prevention monitoring and response; , logging and alerting on key events; , information handling procedures based on data type, e-commerce application and network security; , and system and application vulnerability scanning.

Appears in 2 contracts

Samples: Customer Master Services Agreement, Master Services Agreement

AutoNDA by SimpleDocs

Communications and Operations Management. The IT organization manages changes to the corporate infrastructure, systems and applications through a centralized change management program, which may include, testing, business impact analysis and management approval, approval where appropriate. Incident response procedures exist for security and data protection incidents, which may include incident analysis, containment, response, remediation, reporting and the return to normal operations. To protect against malicious use of assets and malicious software, additional controls may be implemented, implemented based on risk. Such controls may include, but are not limited to, information security practices policies and standards; , restricted access; , designated development and test environments; , virus detection on servers, desktops desktop and notebooks; virus email attachment scanning; system compliance scans; , intrusion prevention monitoring and response; , logging and alerting on key events; , information handling procedures based on data type, e-e- commerce application and network security; , and system and application vulnerability scanning.

Appears in 1 contract

Samples: Master Services Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!