Intrusion Detection Systems Sample Clauses

Intrusion Detection Systems. We have implemented and maintain a host-based intrusion detection system and network- based instruction detection system designed to alert us in the event of suspicious activity.
AutoNDA by SimpleDocs
Intrusion Detection Systems. Describe the intrusion detection system (“lDS”) environment and the Security Breach and event escalation process. Indicate who manages the IDS environment. Specify the services, tools and connectivity required to manage the IDS environment, and if the IDS network is host based.
Intrusion Detection Systems. The Vendor must implement and comply with Customer's preferred security protocols, including but not limited to Single Sign On and Secure Email. 9.
Intrusion Detection Systems. The Hosting Vendor shall use a wide variety of automated monitoring systems to provide a high level of performance and availability for the Vendor System to Customer. Hosting Vendor monitoring tools shall be designed to detect unusual or unauthorized activities and conditions at ingress and egress communication points. These tools shall monitor server and network usage, port scanning activities, application usage, and unauthorized intrusion attempts. The tools shall have the ability to set custom performance metrics thresholds for unusual activity. Such thresholds shall be established from time to time subject to Customer approval, which shall not be unreasonably withheld.
Intrusion Detection Systems. Databricks leverages security capabilities provided natively by Cloud Service Providers for security detection.

Related to Intrusion Detection Systems

  • Information Systems The Official Agency in conjunction with the Authority will meet the relevant requirements of Articles 131 to 136 of Regulation (EU) 2017/625 and Implementing Regulation (EU) 2019/1715 as appropriate to the Official Agency. The Official Agency shall record appropriate data in the Official Agency Premises Inspection database (OAPI), which will be further developed over the life of the contract. Data should be entered into the database on an ongoing basis but shall be entered within one month of the activity taking place, unless otherwise agreed with the Authority.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

  • Sprinkler System If there now is or shall be installed in the Building a "sprinkler system", and such system or any of its appliances shall be damaged or injured or not in proper working order by reason of any act or omission of Tenant, Tenant's agents, servants, employees, licensees or visitors, Tenant shall forthwith restore the same to good working condition at its own expense; and if the New York Board of Fire Underwriters or the New York Fire Insurance Rating Organization or any bureau, department or official of the state or city government, shall require or recommend that any changes, modifications, alterations or additional sprinkler heads or other equipment be made or supplied by reason of Tenant's business, or the location of the partitions, trade fixtures, or other contents of the Premises, Tenant shall, at Tenant's expense, promptly make and supply such changes, modifications, alterations, additional sprinkler heads or other equipment.

  • Information Systems Acquisition Development and Maintenance Security of System Files. To protect City Information Processing Systems and system files containing information, Service Provider will ensure that access to source code is restricted to authorized users whose specific job function necessitates such access.

  • PFPC System PFPC shall retain title to and ownership of any and all data bases, computer programs, screen formats, report formats, interactive design techniques, derivative works, inventions, discoveries, patentable or copyrightable matters, concepts, expertise, patents, copyrights, trade secrets, and other related legal rights utilized by PFPC in connection with the services provided by PFPC to the Fund.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!