Detection. 2.1 Supplier shall monitor its system and its procedures for security breaches, violations and suspicious (questionable) activity. This includes suspicious external activity (including, without limitation, unauthorized probes, scans or break-in attempts) and suspicious internal activity (including, without limitation, unauthorized system administrator access, unauthorized changes to its system or network, system or network misuse or Program Information theft or mishandling).
Appears in 14 contracts
Samples: Financial Reporting Services Agreement, Financial Reporting Services Agreement (BofA Funds Series Trust), Financial Reporting Services Agreement (Columbia Funds Master Investment Trust, LLC)
Detection. 2.1 Supplier shall monitor its system and its procedures for security breaches, violations and suspicious (questionable) activity. This includes suspicious external activity (including, without limitation, unauthorized probes, scans or break-in attempts) and suspicious internal activity (including, without limitation, unauthorized system administrator access, unauthorized changes to its system or network, system or network misuse or Program Information theft or mishandling).
2.2 Reserved
2.3 Reserved
2.4 Reserved
2.5 Reserved
Appears in 2 contracts
Samples: Accounting Services Agreement (BofA Funds Series Trust), Sub Administration Agreement (BofA Funds Series Trust)