EXTERNAL SECURITY Sample Clauses

EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No
AutoNDA by SimpleDocs
EXTERNAL SECURITY. Pear Deck service is hosted and protected by Google Cloud Computing
EXTERNAL SECURITY. All IOP systems have installed firewalls, password protected servers and antivirus softwa
EXTERNAL SECURITY. All data collected through the Service is stored and processed in the United States. Our service is hosted on the Microsoft Azure cloud platform, which provides DDoS protection, NAT endpoints, and monitoring capabilities. Databases are located behind firewalls that require user/password credentials and pre- authorized IP-addresses
EXTERNAL SECURITY. Amplify maintains a comprehensive security program, as described in the attached security statement. Sections 4 (Application Security by Design), 5 (Proactive Security), and 6 (Reactive Security) are all directly relevant to external security. Amplify undergoes annual third party security examinations, including SOC 2 Type 2 examination. Examination results are available upon request.
EXTERNAL SECURITY. Barobo follows NIST Cybersecurity Framework Version 1.1.
EXTERNAL SECURITY. Carnegie Learning has implemented an information security program with numerous measures, including administrative, technical and physical controls that are designed to reasonably safeguard information that can individually identify you against the loss, misuse and alteration of the information under our control. Physical security of Carnegie Learning production systems and data including any such data is provided by AWS . Our offices and staff are in a class A office building secured by RFID badges and security guards, 24/7
AutoNDA by SimpleDocs
EXTERNAL SECURITY. Data Security. The Service Provider agrees to abide by and maintain adequate data security measures, consistent with industry standards and technology best practices, to protect Student Data from unauthorized disclosure or acquisition by an unauthorized person.
EXTERNAL SECURITY. Discovery Education has a comprehensive vulnerability management program that includes regular automated scans, and a suite of cybersecurity tools including endpoint protection and firewalls, with 24/7 monitoring provided by a Managed Security Services Provider (MSSP).
EXTERNAL SECURITY. In connection with our Student Records Security Plan, we maintain administrative, technical and physical safeguards designed to secure Student Records both during transmission and while in our custody. These safeguards include technical and operational measures, such as firewalls, routers, encryption (at rest and in-transit), passwords, and vulnerability testing, as well as training, policies and procedures to limit access to Student Records to authorized staff, contractors and agents that have a legitimate need to access such data for purposes of enabling us to deliver and support our products and services to our Education Customers, and that are under appropriate contractual obligations of confidentiality, data protection and security.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!