Firewalls and antivirus Sample Clauses

Firewalls and antivirus. All the Supplier’s computers have Antivirus installed to protect against virus, phishing etc. All on-prem servers are hosted in a professional datacenter behind firewall and can only be accessed via MFA controlled VPN or from inside our corporate network. All cloud-based infrastructure, i.e. the Supplier’s Microsoft Azure tenant, are only accessible with MFA authentication integrated with our corporate authentication setup. The Supplier’s office network is based on Cisco Meraki technology and Wifi is same and integrated with corporate authentication Microsoft Azure Active Directly.
AutoNDA by SimpleDocs
Firewalls and antivirus xxx.xxxxx networks have been segmented in order to keep data separate. This is handled by the Operations Department of xxx.xxxxx. All networks have been segmented in such a way that client use is separated from internal use. The networks for internal use are furthermore segmented into more networks to avoid security incidents, if a service is down. This is handled by the Operations Department, and xxx.xxxxx CTO is responsible for compliance with xxx.xxxxx security policy. Authorised members of staff have remote access to xxx.xxxxx systems. Access to xxx.xxxxx systems is only possible through either MAC address limited networks or through xxx.xxxxx SSL VPN. A guest network has been established for externals visiting our offices. Due to malware having significant impact on the availability of systems and services, xxx.xxxxx has set up efficient malware protection. Every xxx.xxxxx server has antivirus protection. Only select members of staff with admin ac- cess can remove that software from the systems. All incoming email traffic is scanned for malicious content which is then removed. According to xxx.xxxxx SLA (service level agree- ment), customer data requires full protection on servers rented by xxx.xxxxx. We have implemented scan and surveillance systems to safeguard us from known and mali- cious code, i.a. anything we and our customers may pick up from the internet or via emails etc. We have antivirus systems as well as systems for monitoring use of the internet, traffic and resources on the SaaS platforms, as well as security warning in other technical and cen- tral installations (firewall etc.)

Related to Firewalls and antivirus

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Accreditation of Public Schools and Adoption and Implementation of School Plans The District will implement a system of accrediting all of its schools, as described in section 22-11- 307, C.R.S., which may include measures specifically for those schools that have been designated as Alternative Education Campuses, in accordance with the provisions of 1 CCR 301-57. The District will ensure that plans are implemented for each school in compliance with the requirements of the State Board pursuant to 1 CCR 301-1.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Skills and Abilities (i) Ability to communicate effectively both verbally and in writing.

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.