EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No
Appears in 29 contracts
Samples: www.rcsdk8.org, www.rcsdk8.org, Customer Agreement
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No_X______ No _______
Appears in 7 contracts
Samples: www.rcsdk8.org, www.rcsdk8.org, www.rcsdk8.org
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No_x______ No _______
Appears in 4 contracts
Samples: www.rcsdk8.org, www.rcsdk8.org, www.rcsdk8.org
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes X No
Appears in 3 contracts
Samples: Technology Services, www.rcsdk8.org, www.rcsdk8.org
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No_______ No _______
Appears in 2 contracts
Samples: www.rcsdk8.org, rcsdk8.org
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the arethe minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No
Appears in 1 contract
Samples: www.rcsdk8.org
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes NoX No _
Appears in 1 contract
Samples: www.rcsdk8.org
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No___X____ No _______
Appears in 1 contract
Samples: www.rcsdk8.org
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No_Y______ No _______
Appears in 1 contract
Samples: www.rcsdk8.org
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No_Y_e_s_*___ No _______
Appears in 1 contract
Samples: www.rcsdk8.org
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes _x No
Appears in 1 contract
Samples: www.rcsdk8.org