Intrusion Detection/Prevention Sample Clauses

Intrusion Detection/Prevention. 16.1 Moorepay will monitor events generated from the network devices for any anomalies; events are logged in the Security Information and Event Management Solution (SIEM), which is managed by the security team. In accordance with the Moorepay Network Security Standard, the following security controls are deployed to firewalls:
AutoNDA by SimpleDocs
Intrusion Detection/Prevention and Malware — appropriate security measures and procedures (i) to ensure that UBS Data, assets and /or systems being used to provide Services is protected against the risk of intrusion and the effects of viruses, Trojan horses, worms, and other forms of malware, and (ii) to monitor each and every instance of access to the Supplier’s assets and information systems and to UBS Data to detect the same, and to promptly respond to the same. The Supplier shall immediately notify UBS of any actual or attempted instances of unauthorized access to the UBS Data and/or such assets and systems.
Intrusion Detection/Prevention. Jostens implements and monitors Intrusion Detection System (IDS) mechanisms on all critical systems and networks. Network Security

Related to Intrusion Detection/Prevention

  • Contamination The presence in, on or under land, air or water of a substance (whether a solid, liquid, gas, odour, heat, sound, vibration or radiation) at a concentration above the concentration at which the substance is normally present in, on or under land, air or water in the same locality, that presents a risk of Environmental Harm, including harm to human health or any other aspect of the Environment, or could otherwise give rise to a risk of non-compliance with any Statutory Requirement for the protection of the Environment.

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Acceptance Testing At the time of installation of a LIS trunk group, and at no additional charge, acceptance tests will be performed to ensure that the service is operational and meets the applicable technical parameters.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

Time is Money Join Law Insider Premium to draft better contracts faster.