Data Center Security Sample Clauses

Data Center Security. All data centers comply with or exceed the security requirements of SOC2. All data centers are equipped with CCTV, on-site security personnel and key card access system.
AutoNDA by SimpleDocs
Data Center Security. Licensor shall take reasonable actions to ensure the security of the Data Center while performing Licensor’s duties. Licensor agrees to comply with the State’s security policies/rules, procedures and processes. State’s security polices/rules, procedures and processes may be revised from time to time. These revisions, or any additions shall be posted in the common areas or otherwise provided to Licensor by the State. State may issue additional security policies/rules, procedures and processes as deemed necessary. Licensor acknowledges that security cameras are in use throughout the Data Center. All persons, whether employees, representatives or invitees of Licensor, granted access to the Data Center are subject to security screening conducted by the State. This includes, but is not limited to, providing acceptable personal picture identification. The individual must be on the personnel listing provided to the State by Licensor. State may refuse access to the Data Center to any person who, in State’s sole discretion, presents an unreasonable security risk. Licensor must report any physical security related incidents at the Data Center to Data Center personnel immediately. The security system requires that all doors be closed at all times, and lights be turned off except while an area is occupied. Secure all doors on exiting an area, and in areas that do not have automatic lights, turn off the lights to conserve energy. Temporary blocking of a door for the movement of equipment is permitted but doors must be closed immediately after equipment movement. Licensor shall be responsible for securing the premises upon completion of the work. No door or gate shall remain unlocked. Badge Access with BIO-finger print reader shall be utilized for access to the Data Center. Licensor shall be responsible for keys, and badges assigned and all costs related to replacement of lost badges or lost keys or replacement of locks. All persons, whether employees, representatives or subcontractors granted access to the Data Center shall badge through a secured door. No “piggybacking” or "tailgating" is permitted. Only employees of Licensor shall be allowed in the building. No family members, friends or pets (except service animals) shall be allowed access. Only on an emergency basis may access be allowed without background checks. Licensor is not allowed to take or distribute photos or videos of the Data Center without written permission from State Information Technology Services D...
Data Center Security. OneNeck shall provide the following services, which shall comprise “Data Center Security Services,” provided, however, that any obligations set forth in this Article 2.2 shall be in addition to and shall in no way limit any other obligations of OneNeck regarding security as may be required by Client. 2.2.1. OneNeck shall, for any and all matters concerning the Services, perform reasonable security actions as may be agreed to by Client and OneNeck. 2.2.2. OneNeck shall protect the Data Center against unauthorized access. OneNeck shall monitor and maintain Physical Security at the Data Center; limiting access to authorized personnel only. 2.2.3. OneNeck shall provide operator-attended Data Center operations twenty-four (24) hours per day, every day of the year. 2.2.4. OneNeck shall perform routine monitoring of the Data Center facility. 2.2.5. OneNeck shall provide escorted Data Center facility access to Client representatives provided written notification with purpose and intent is provided to OneNeck twenty four (24) hours in advance of the visit. 2.2.6. OneNeck shall provide escorted Data Center facility access to Client 3rd party vendor representatives only when Client provides written notification and authorization, including purpose and intent, to OneNeck two (2) weeks in advance of the visit. 2.2.7. OneNeck agrees to make a reasonable effort to maintain the Physical separation of the Client computing environments from any other computing environments over which OneNeck can exercise control, except for those required to provide the Services. 2.2.8. OneNeck will also perform and enforce any data center security process agreed upon by the Parties to provide secure data tapes transport between the Data Center facility and off-site storage facility.
Data Center Security. In connection with providing the Web Hosting Services described below, Sabre will provide facility and resource security services at the Tulsa Data Center as follows:
Data Center Security. (a) CSG will undertake and maintain physical, administrative, and technical safeguards and other security measures necessary to ensure the security and confidentiality of (x) Charter Customer Information, and (y) CSG-supplied assets, systems and software. As part of the Services, CSG will maintain and enforce at each data center, and all other locations where services relating directly or indirectly to the Services are performed, safety and physical and computer system security procedures that are at least (i) equal to current industry standards for such types of service locations; and (ii) as rigorous as those procedures in effect at the service location as of the effective date of the Agreement. In the event that CSG becomes aware of a potential compromise to the security of a data center, CSG will, [****** * ************ ********** ****], notify Customer of such potential compromise after verifying the reasonable possibility of such potential compromise based upon plausible evidence. The parties will work together in good faith to isolate any potentially compromised host to determine the current security posture and whether further corrective action is necessary. However, CSG shall maintain control, discretion, and responsibility for infrastructure changes necessary to resolve any potential compromise. (b) CSG must test the security of its systems used in connection with this Agreement on a [******** *****], as necessary to confirm system integrity and security as consistent with current industry standards and best practices. CSG is responsible for and shall conduct penetration testing of any Product, Service or system that contains [*** ****] to identify and remediate vulnerabilities in CSG’s environment. CSG further agrees to conduct such penetration testing and remediation of identified vulnerabilities based upon industry accepted penetration testing approaches (e.g., NIST SP800-115 or Payment Card Industry Standard). CSG shall: (i) Employ a program of code analysis to identify security vulnerabilities in software code during the development process, and not issue a release that contains critical, high, or medium vulnerabilities using the Common Vulnerability Scoring System. (ii) Perform vulnerability scans at least every [****** ****] days. (iii) Perform penetration tests. Such penetration testing shall be: (i) conducted using appropriately qualified assessors; (ii) based on current industry accepted penetration testing approaches (for example, NIST...
Data Center Security. Vendor shall maintain an audited security program, such as SOC 2, ISO 27001, or Fed Ramp compliance standards. Vendor site(s) shall be highly restricted to both physical and electronic Access through public (internet) and private (intranet) networks to eliminate unwanted interruptions.
Data Center Security. Question Yes No Describe capability, supporting evidence, and any missing elements
AutoNDA by SimpleDocs
Data Center Security. Pearson utilizes state-of-the-art facilities provided by data center providers in multiple locations for housing and securing its application servers. ● Internet Data Centers – Pearson contracts with Internet data center service providers for physical hosting of our online learning application infrastructure. These service providers are required to comply with or exceed Pearson standards regarding information security and confidentiality. ● Equipment Housing at Data Centers - All systems are housed within locked cages or wholly dedicated and controlled areas within the hosting facilities. These facilities provide a secure and reliable infrastructure for highly available applications used worldwide. The highest quality equipment, practices, and staff are employed to ensure performance, reliability, and security. ● Control of Physical Access at Data Centers - Physical access to the cage areas is limited to individuals on the approved access control list. Such individuals must present photo identification to guards that are stationed 24/7. Specified Pearson personnel or authorized Pearson service providers maintain physical access authority at all times. Standing access to Pearson systems is restricted to employees of Pearson with a ‘need to access’.
Data Center Security. Only answer “
Data Center Security. (i) The Vendor shall implement and maintain appropriate physical and environmental security controls to prevent unauthorised access, damage and interference to any Data Centres containing Customer Data or any information utilised in the provision of the work. (ii) The Vendor shall ensure that all Data Centres are certified to ISO 27001 (or any standard which replaces or supplements ISO 27001). (iii) The Vendor shall give the Customer reasonable prior written notice of any proposed change by Vendor of any procedures or policies applicable to a Data Centre which might reasonably be expected to increase the risk to the security and Integrity of any Customer Data.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!