Contractor Systems Security. 4.10.1 The physical location of the application systems shall be within controlled access facilities. Individual users may not have access to the data except through their systems that are specifically credentialed for Contractor business. All access will be controlled by authentication methods to validate the approved users. 4.10.2 Standards for secure transmission may be accomplished through such means as certificates, secure socket layer, etc., and storage of the data with encryption, if applicable. 4.10.3 Both CSD and Contractor shall maintain security patches and anti-virus software updates.
Appears in 3 contracts
Samples: Standard Agreement, Contract Agreement, Contract Agreement
Contractor Systems Security. 4.10.1 4.5.2.1 The physical location of the application systems (servers) shall be within controlled access facilities. Individual users may not have access to the data except through their systems that are specifically credentialed for Contractor business. All access will be controlled by authentication methods to validate the approved users.
4.10.2 4.5.2.2 Standards for secure transmission may be accomplished through such means as certificates, secure socket layer, etc., and storage of the data with encryption, if applicable.
4.10.3 4.5.2.3 Both CSD and Contractor shall maintain security patches and anti-virus software updates.
Appears in 1 contract
Samples: Standard Agreement