Communications Security. (a) Firewalls: Ring Central deploys reasonably appropriate firewall technology in operation of the Services. .
Communications Security. 8.1. Network security management
Communications Security. 9.1 Leading Resolutions shall ensure that all external connections to the Supplier Systems (including, without limitation, networks or remote access) and shall be individually identified, verified, recorded, and approved by Leading Resolutions.
9.2 Leading Resolutions shall ensure that wireless access to the Supplier Systems is subject to authentication authorisation, and encryption protocols in line with Good Industry Practice and shall only be permitted from locations approved by Leading Resolutions.
Communications Security. Comcast shall put data transfer policies and procedures in place to protect Company PI that is transferred electronically.
Communications Security. C.2.9.1. The data processor shall deploy a secure Virtual Private Network (VPN) connection for its staff accessing its internal network remotely. Users shall use a two-factor authentication in order to enable the VPN connection.
C.2.9.2. The data processor shall deploy advanced firewalls to protect its network, including protection against malicious software and advanced intrusion techniques, as well as to segment its network to ensure resilience.
C.2.9.3. The data processor shall deploy solutions designed to monitor and log the activity on its network. The logs shall be continuously monitored to timely identify and remedy security incidents and shall be retained in accordance with the data processor’s formal policies and procedures.
C.2.9.4. The data processor shall synchronize system clocks on network servers to a universal time source (e.g. UTC) or network time protocol (NTP).
Communications Security. Fidelity will maintain reasonably appropriate network security and information transfer controls that are designed to ensure the protection of Information Systems, including firewalls, intrusion detection and prevention systems, antimalware, proxy servers and secure file transfer technologies. Fidelity will: i) use multi-factor authentication for remote virtual private network (VPN) access and administration of specific core infrastructure components based upon risk, ii) design all networks to protect network integrity and separate network zones with a firewall or equivalent to restrict traffic to only authorized business traffic, and iii) review firewall policies annually.
Communications Security. Jostens supports standards and procedures that ensures confidentiality, integrity, and availability of information and services with continuous oversight on new threats and vulnerabilities by a documented risk assessment process driving risk mitigation implementation on a timely basis.
Communications Security. Network Security
i. Silverfin logically segregates Customer data within a shared service environment.
ii. Silverfin secures network segments from external entry points where Customer data is accessible.
iii. External network perimeters are hardened and configured to prevent unauthorized traffic.
iv. Inbound and outbound points are protected by firewalls and intrusion detection systems (IDS). c. Ports and protocols are limited to those with specific business purpose.
v. Silverfin synchronizes system clocks on network servers to a universal time source (e.g. UTC) or network time protocol (NTP).
vi. Customer data, including personal data, is encrypted at rest.
vii. Silverfin encrypts data during transmission between each application tier and between interfacing applications.
Communications Security. Sublessor retains the right to establish ----------------------- procedures and equipment and software configurations to provide communications security for the telephone system and the computer wiring in all areas of the Premises. Sublessee shall provide and operate its own computer and telephone network.
Communications Security. The Data Processor must maintain network security using commercially available equipment and industry standard techniques, including firewalls and intrusion detection systems. The infrastructure must be segmented to at least separate production systems from test and development environments. All personal data transmitted by the Data Processor must be encrypted while in transit. dele