Firewall Management Sample Clauses

Firewall Management. Firewall management processes must be documented and meet industry standards. Any files containing Client Data on a system connected to the internet must be protected with up to date, industry standard, firewall protections and operating system security patches designed to maintain integrity and security of the Client Data.
AutoNDA by SimpleDocs
Firewall Management. The management of firewalls includes: o Configuration of rules for NAT, access, users' login, etc. o Troubleshooting problems with the firewall HP-OMS RESPONSIBILITIES o Provide deliverables as mentioned above o Ensure that the Security Policies are followed o Periodic changes to Secure Remote password for Secure Remote users o Maintain the latest security patches o Provide connectivity from any Customer Site to any Customer Site ("full mesh") o Manage and maintain the Gateway anti virus connectivity and functionality o Take all measure available by the Firewall (checkpoint) in use to enforce the security policy last approved by the parties. o Allow Customer to perform security audits in accordance with the AGREEMENT, SECTION [10.10] (AUDIT RIGHTS). PORTIONS OF THIS AGREEMENT HAVE BEEN OMITTED PURSUANT TO A REQUEST FOR CONFIDENTIAL TREATMENT FROM THE SEC Exhibit A - Service Description JOINT RESPONSIBILITIES o HP-OMS and the Customer will agree on a Change Request process for firewall changes, including a list of authorized requestors and approval personnel.
Firewall Management. The firewall management service provides an enterprise class firewall, configured, managed and updated. The Supplier will provide five changes per month free of charge. Additional changes may be subject to a charge. An annual rule audit will be performed by the Supplier in consultation with the Customer to ensure rules are relevant. Redundant rules will be deleted. Charging is per firewall device with a minimum term of 36 months.
Firewall Management. CMS shall: The Non-CMS Organization shall:
Firewall Management. 2.3.1 The Firewall Management pricing is based on the Resource Volume Baselines contained in Exhibit C-1.
Firewall Management. ACS shall provide firewall management Services including firewall engineering and management and access control list engineering and management in compliance with Symetra’s policies and standards. The following table identifies roles and responsibilities associated with the firewall management Services. 1. Recommend best practice firewall policies X 2. Develop Symetra specific firewall polices X 3. Approve firewall polices X 4. Provide Services in conformance to firewall policies X 5. Perform firewall engineering and firewall security design X 6. Assess firewall security and propose alternative security designs X 7. Review and approve firewall security designs X
Firewall Management. The service provider provides service to the user with hardware firewall; such service has basic functions of firewall such as multiple filter, access control and security log. Based on the accurate Firewall Management Service Application submitted by the user and with the cooperation of the user, the service provider shall complete configuration (including installation and test run of firewall equipment and security policy configuration) within 5 working days and issue Firewall Management Service Activation Notice to the user. If the user has any dissent with the configuration, examination requirement shall be made to the service provider within 3 days after receiving the aforementioned notice based on the Firewall Management Service Application, “Firewall Management Information Base” of the service provider and relevant “Firewall Policy Documents”. If the user fails to raise written objection within 3 working days after receiving the aforementioned notice, the configuration is deemed to have been completed and qualified. The service provider shall issue a monthly Firewall Management Service Report, which includes firewall operation conditions, maintenance and upgrade notification. If the user has any dissent with such service, written application to inquire about various statistics within the report period shall be submitted to the service provider within one week after receiving the Firewall Management Service Report, the service provider shall make investigation within 3 days after receiving the written application based on the Firewall Management Service Application, “Firewall Management Information Base” of the service provider and relevant “Firewall Policy Documents”. If the user fails to raise objections against the report within such period, the service deemed to be qualified within the report period. The service provider and the user acknowledge that network security cannot be fully guaranteed no matter how strictly-prevented the firewall is, nor can the service provider guarantee that the firewall service will never be ineffective. The service provider will maintain the effectiveness of the firewall with its best efforts.
AutoNDA by SimpleDocs

Related to Firewall Management

  • Traffic Management 9.2.1 During the Operating Period, Developer shall be responsible for the general management of traffic on the Project. Developer shall manage traffic so as to preserve and protect safety of traffic on the Project and Related Transportation Facilities and, to the maximum extent practicable, to avoid disruption, interruption or other adverse effects on traffic flow, throughput or level of service on the Project and Related Transportation Facilities. Developer shall conduct traffic management in accordance with all applicable Technical Provisions, Technical Documents, Laws and Governmental Approvals, and in accordance with the Traffic Management Plan. 9.2.2 Developer shall prepare and submit to TxDOT and the Independent Engineer for TxDOT approval a Traffic Management Plan for managing traffic on the Project and Related Transportation Facilities after the commencement of traffic operations on any portion of the Project, addressing (a) orderly and safe movement and diversion of traffic on Related Transportation Facilities during Project construction, (b) orderly and safe movement of traffic on the Project and (c) orderly and safe diversion of traffic on the Project and Related Transportation Facilities necessary in connection with field maintenance and repair work or Renewal Work or in response to Incidents, Emergencies and lane closures. Developer shall prepare the Traffic Management Plan according to the schedule set forth in the Technical Provisions. The Traffic Management Plan shall comply with the Technical Provisions and Technical Documents concerning traffic management and traffic operations. Developer shall carry out all traffic management during the Term in accordance with the approved Traffic Management Plan. 9.2.3 Developer shall implement the Traffic Management Plan to promote safe and efficient operation of the Project and Related Transportation Facilities at all times during the course of any construction or operation of the Project and during the Utility Adjustment Work. 9.2.4 TxDOT shall have at all times, without obligation or liability to Developer, the right 9.2.4.1 Issue Directive Letters to Developer regarding traffic management 9.2.4.2 Provide on the Project, via message signs or other means consistent with Good Industry Practice, non-Discriminatory traveler and driver information, and other public information (e.g. amber alerts), provided that the means to disseminate such information does not materially interfere with the functioning of the ETCS.

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • SITE MANAGEMENT We reserve the right, but not the obligation, to: (1) monitor the Site for violations of these Terms of Use; (2) take appropriate legal action against anyone who, in our sole discretion, violates the law or these Terms of Use, including without limitation, reporting such user to law enforcement authorities; (3) in our sole discretion and without limitation, refuse, restrict access to, limit the availability of, or disable (to the extent technologically feasible) any of your Contributions or any portion thereof; (4) in our sole discretion and without limitation, notice, or liability, to remove from the Site or otherwise disable all files and content that are excessive in size or are in any way burdensome to our systems; and (5) otherwise manage the Site in a manner designed to protect our rights and property and to facilitate the proper functioning of the Site.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following: i. Information pertaining to tuition rates, payments, and educational assistance payments; and

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement. 60.2 The Parties will employ characteristics and methods of operation that will not interfere with or impair the Parties’ networks, or the network of any third parties or Affiliated companies, connected with or involved directly in the network or facilities of CenturyLink. 60.3 CLEC shall not interfere with or impair service over any circuits, facilities or equipment of CenturyLink, its Affiliated companies, or its connecting and concurring carriers. 60.4 If CLEC causes any impairment or interference, CenturyLink shall promptly notify CLEC of the nature and location of the problem and that, unless promptly rectified, a temporary discontinuance of the use of any circuit, facility or equipment may be required. The Parties agree to work together to attempt to promptly resolve the impairment or interference. If CLEC is unable to promptly remedy, then CenturyLink may, at its option, temporarily discontinue the use of the affected circuit, facility or equipment until the impairment is remedied. 60.5 Any violation of Applicable Law or regulation regarding the invasion of privacy of any communications carried over CenturyLink’s facilities, or that creates hazards to the employees of CenturyLink or to the public, is also considered an impairment of service. 60.6 CenturyLink shall give advanced notice to CLEC of all non-scheduled maintenance or other planned network activities to be performed by CenturyLink on any Network Element, including any hardware, equipment, software, or system, providing service functionality of which CLEC has advised CenturyLink may potentially impact CLEC End Users. 60.7 The Parties shall provide notice of network changes and upgrades in accordance with 47 C.F.R. §§51.325 through 51.335. CenturyLink may discontinue any Interconnection arrangement, Telecommunications Service, or Network Element provided or required hereunder due to network changes or upgrades after providing CLEC notice as required by this Section. CenturyLink agrees to cooperate with CLEC and/or the appropriate regulatory body in any transition resulting from such discontinuation of service and to minimize the impact to customers which may result from such discontinuance of service.

  • General Management In the discharge of its general duty to manage the successful performance of the Services, Vendor shall: 3.2.1.1. within thirty (30) calendar days of the Effective Date, identify to Citizens the primary and secondary management contacts responsible for the oversight and management of Services for Citizens; 3.2.1.2. ensure Vendor Staff tasked with management and oversight of the Services are available promptly to perform Services during Business Hours; 3.2.1.3. ensure each assigned Adjuster submits a time record directly to Vendor’s manager or point of contact. At any time during this Agreement, Citizens may require copies of time records from Vendor; 3.2.1.4. ensure that no Vendor Staff carries a weapon on their person while performing Services; 3.2.1.5. ensure that no Vendor Staff uses impairing drugs, chemicals, or alcohol while performing Services; 3.2.1.6. ensure that Vendor Staff avoid using their duties and obligations under this Agreement to engage in any conduct that could create either an actual or perceived conflict of interest, such as due to an ongoing business relationship with an entity other than Citizens that would enable Vendor Staff to receive an improper benefit or unfair competitive advantage; 3.2.1.7. ensure that the Services comply with the Best Claims Practices & Estimating Guidelines as applicable to each Service Category and any other policies or processes set forth by Citizens, including but not limited to: a. monitoring applicable file production on a weekly basis to determine compliance with Citizens’ production requirements; and, b. providing detailed reports to Citizens related to Vendor performance upon request.

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Service Management Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!