Communications Security and Data Transfer. a. The Contractor has network policies which implements the following: a. Segregation and Filtering of Traffic between Internet and Corporate Zones and between the different Corporate Zones b. Intrusion Detection Capability c. Access Control and Password Policies on Network Devices d. Regular Network vulnerability/Penetration tests conducted by an independent third party at least annually.
Appears in 4 contracts
Samples: Agreement for the Provision of Aircraft Interior Cleaning, Agreement for the Provision of Cleaning, Housekeeping and Pest Control Services, Agreement for the Provision of Security Officers and Senior Security Officers