Device Security Management Sample Clauses

Device Security Management. As part of the APEX Service, Dell will centrally deploy, configure and maintain a security software application on the Device during normal business hours. This includes, but is not limited to, configuring the agent on the Device, updating and maintaining security policies, reviewing any relevant events and/or alerts (and notifying the customer should they occur), consulting with our security partner (where applicable), encrypting the storage device on the Device, applying and enforcing certain operating system policies, updating and patching applications (where authorized by the Customer) and, in general, any other action that Dell deems necessary or convenient to reduce the risk of malware and/or malicious activity affecting the Device. It is expressly stated and understood that Dell cannot ensure and does not warrant nor guarantee that the Device will be free of malware and/or malicious activity, but that Dell will undertake commercially reasonable measures to prevent such activity.
AutoNDA by SimpleDocs
Device Security Management. Once the Customer network has been deployed onto the Insite systems, responsibility for the password lock-down of the devices passes onto the Operations Centre, which then changes all passwords of the devices and refers the authentication of any further login attempts to a TACACS+ Server. Tacacs will be added. NO PASSWORDS ON THE DEVICES WILL BE CHANGED. There might be some automated processes in place which rely on these passwords. All unnecessary logins/passwords will be removed within the first 6 weeks as part of the normal change control process. The TACACS+ server provides the AAA authentication service. This prevents unauthorised access to the client’s devices. All managed devices are configured to refer login attempts to the TACACS+ server, which will then give the managed device the go-ahead to accept the connection. A fallback login method will be put in place (login using device-local authentification) in case of network and/or Tacacs failures (open for discussion). Only Operations Centre personnel and the relevant senior DD Engineering staff have access to managed devices. Should anyone other than the above require access, a change control request has to be submitted onto the Service Portal. Note that most, but not all, devices support TACACS authentication. This will be identified to the Customer during pre-deployment scooping sessions. In addition this mechanism is not able to protect the device from physical break-in, such as powering down a device and gaining access through the console port on the device. Unauthorised access in this fashion will be detected by the device going down on the management system and by the random configuration-file scan detecting that changes had been made on the device but will not have access to any of the audit trails mentioned below.

Related to Device Security Management

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Account Management 15.1 The Contractor is required to provide a dedicated Strategic Account Manager who will be the main point of contact for the Authority. The Strategic Account Manager will:  Attend quarterly, or as otherwise agreed, review meetings with the Authority, in person at the Authority’s premises or other locations as determined by the Authority  Attend regular catch-up meetings with the Authority, in person or by telephone/videoconference  Resolve any on-going operational issues which have not been resolved by the Contractor or Account Manager(s) and therefore require escalation  Ensure that the costs involved in delivering the Framework are as low as possible, whilst always meeting the required standards of service and quality.

  • Cash Management Systems On or prior to the Closing Date, Borrowers will establish and will maintain until the Termination Date, the cash management systems described in Annex C (the “Cash Management Systems”).

  • Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:

  • Relationship Management LAUSD expects Contractors and their Representatives to ensure that their business dealings with and/or on behalf of LAUSD are conducted in a manner that is above reproach.

  • ELECTRICAL SERVICES A. Landlord shall provide electric power for a combined load of 3.0 xxxxx per square foot of useable area for lighting and for office machines through standard receptacles for the typical office space.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!