Intrusion Detection System Sample Clauses

Intrusion Detection System. Genesys has implemented intrusion detection across the Cloud Services environment that meets PCI DSS requirements.
AutoNDA by SimpleDocs
Intrusion Detection System. (a) 1 DMP 142 zone panel (b) 1 DMP wireless LCD Keypad (c) 1 DMP wireless high power receiver (d) 1 DMP wireless siren (e) 4 DMP Motion Sensors
Intrusion Detection System. (a) 3 DMP 142 zone panels (b) 6 DMP wireless LCD Keypads (c) 3 DMP wireless high power receivers (d) 3 DMP wireless sirens (e) 1 DMP glass break sensor (f) 22 DMP wireless door sensor/transmitters
Intrusion Detection System. We will implement intrusion detection systems across the Cloud Services Environments which may be either network based, host based or a combination of the two.
Intrusion Detection System. The Contractor must design, procure, install, program, test, document, and provide training to multiple personnel, for a complete turn-key system. • The work will include, but may not be limited to the following; - Install a TSA Office of Security approved Bosch intrusion detection system or approved equal. - Install a Bosch Model D9412Gv4 or approved equal. - The installer must be a certified vendor who is experienced in the programming the advanced software features associated with this panel and which is required for this security application. - The host panel and all associated control equipment will be located in LAN/Server room (Door 3). - All equipment serving the IDS/Access Control system will be wall mounted on the wall of LAN/SERVER room. - The contractor will provide all equipment mounts, slides, shelves or other items. - Bosch D1265 arm/disarm keypads will be mounted inside the Public Entrances (Door 1) and internal to the LAN ROOM (Door 3), to the facility and will be programmed to accept all password combinations and will have the capability to arm and disarm all alarm points designated as general office security points. - Vendors: The contractor is responsible to ensure selected vendor is competent and current on the required panels. - The alarm system will notify via telephone connection or Internet connection the agency specified location violations of the security system. - Power for all intrusion detection devices installed on the floors are centrally powered and monitored from the LAN ROOM. - All intrusion detection devices are required to interface with the Bosch Model D9412Gv4 system or approved equal. • The Contractor will maintain and warranty the system for one year after the acceptance date. • The Battle Creek Michigan Federal Protective Service (FPS) Mega Center will remotely monitor the installed system and must be compatible with FPS existing hardware and software. Bosch D9412Gv4 • The contractor will be responsible for all the initial input of user codes and completion of the FPS Mega Center Alarm Requirements Document to be provided by the TSA Office of Security once the system has been installed and is ready for set up and programming. • The minimum number of user pass codes must be 249. • All installed equipment must have sufficient power supplies as necessary to provide battery backup for a 4-hour minimum outage.
Intrusion Detection System. All facility external warehouse doors alarmed to detect unauthorized opening and linked to main alarm system.
Intrusion Detection System. (IDS). The Contractor shall maintain the Advantor Intrusion Detection System IAW with manufacturer’s instructions; AR 190-13 The Army Physical Security Program, Chapter 9; AR 190-59, Chemical Agent Security Program, Chapter 17; and the CDTF Physical Security Plan. The Contractor shall coordinate all scheduled maintenance with the COR. When IDS system interruptions occur, the Contractor shall immediately notify the COR and initiate repair as a Priority 1 Emergency.
AutoNDA by SimpleDocs
Intrusion Detection System. (IDS) Software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks - for example: by crackers, malware and/or disgruntled employees. Invoicing Requirement The requirements set out in Attachment 4-G (Form of Invoice) of Exhibit 4 (Pricing and Financial Provisions).

Related to Intrusion Detection System

  • Intrusion Detection All systems involved in accessing, holding, transporting, and protecting DHCS PHI or PI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.04, the parties acknowledge that the Direct Registration System (“DRS”) and Profile Modification System (“Profile”) shall apply to uncertificated American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC pursuant to which the Depositary may register the ownership of uncertificated American Depositary Shares, which ownership shall be evidenced by periodic statements issued by the Depositary to the Owners entitled thereto. Profile is a required feature of DRS which allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register such transfer. (b) In connection with and in accordance with the arrangements and procedures relating to DRS/Profile, the parties understand that the Depositary will not verify, determine or otherwise ascertain that the DTC participant which is claiming to be acting on behalf of an Owner in requesting a registration of transfer and delivery as described in subsection (a) has the actual authority to act on behalf of the Owner (notwithstanding any requirements under the Uniform Commercial Code). For the avoidance of doubt, the provisions of Sections 5.03 and 5.08 shall apply to the matters arising from the use of the DRS. The parties agree that the Depositary’s reliance on and compliance with instructions received by the Depositary through the DRS/Profile System and in accordance with this Deposit Agreement shall not constitute negligence or bad faith on the part of the Depositary.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • Smoke Free Environment The Lessor shall make all parts of the leased premise smoke-free. "

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Sprinkler System If there now is or shall be installed in said building a "sprinkler system" the Tenant agrees to keep the appliances thereto in the demised premises in repair and good working condition, and if the New York Board of Fire Underwriters or the New York Fire Insurance Exchange or any bureau, department or official of the State or local government requires or recommends that any changes, modifications, alterations or additional sprinkler heads or other equipment be made or supplied by reason of the Tenant's business, or the location of partitions, trade fixtures, or other contents of the demised premises, or if such changes, modifications, alterations, additional sprinkler heads or other equipment in the demised premises are necessary to prevent the imposition of a penalty or charge against the full allowance for a sprinkler system in the fire insurance rate as fixed by said Exchange or by any fire insurance company, the Tenant will at the Tenant's own expense, promptly make and supply such changes, modifications, alterations, additional sprinkler head or other equipment. As additional rent hereunder the Tenant will pay to the Landlord, annually in advance, throughout the term 100%, toward the contract price for sprinkler supervisory service.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!