E-MAIL SECURITY Sample Clauses

E-MAIL SECURITY. The use of encrypted and unencrypted e-mail carries a risk of possible interception and revelation to unintended parties. You should not use encrypted or unencrypted e-mail to send confidential information, such as social security numbers or account numbers.
AutoNDA by SimpleDocs
E-MAIL SECURITY. Customers should not use unencrypted e-mail to send confidential information, such as social security numbers, account numbers, etc., to the Bank as these are not secure.
E-MAIL SECURITY a. Vendor will: (1) for anti-spam: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; Confidential Exhibit A-8 — Enterprise Security Management Services (b) scan ACI’s inbound e-mail for spam; (c) provide ACI with the capability to create filters to prevent spam and allow e-mail (i.e., black list, white list); (d) using ACI provided black list and white list, identify spam and take action in accordance with the e-mail security policy (i.e., tag, redirect, delete); (e) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and (f) provide weekly and monthly security reports via e-mail. (2) for porn filtering: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; (b) scan ACI’s inbound and outbound e-mail to detect potentially suspected pornographic images; (c) implement sensitivity settings and routing options in accordance with the e-mail security policy (for example, e-mail containing suspect images can be logged only, tagged, sent or copied to a designated system administrator or deleted); (d) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and (e) provide weekly and monthly security reports via e-mail. (3) for e-mail Antivirus: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; (b) scan ACI’s Internet level e-mail to detect viruses (i.e., known and unknown); (c) notify appropriate contact (for example, e-mail sender, intended recipient, e-mail administrator), in accordance with the established procedures, if an e-mail or attachment contains a virus; (d) handle infected e-mail in accordance with the established procedures; (e) notify ACI of any virus infected e-mail that Vendor was unable to intercept; Confidential Exhibit A-8 — Enterprise Security Management Services (f) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics as well as offers a number of configuration and management facilities; and (g) provide weekly and monthly security reports via ...
E-MAIL SECURITY. IBM will:
E-MAIL SECURITY 

Related to E-MAIL SECURITY

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!