Common use of Intrusion Detection Clause in Contracts

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this involves: 1. Tightly controlling the size and make-up of Google’s attack surface through preventative measures; 2. Employing intelligent detection controls at data entry points; and 3. Employing technologies that automatically remedy certain dangerous situations.

Appears in 4 contracts

Samples: Google Apps for Education Agreement, Google Apps for Education Agreement, Google Apps for Education Agreement

AutoNDA by SimpleDocs

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this intrusion detection involves: 1. Tightly controlling the size and make-up of Google’s attack surface through preventative measures; 2. Employing intelligent detection controls at data entry points; and 3. Employing technologies that automatically remedy certain dangerous situations.

Appears in 3 contracts

Samples: California Student Data Privacy Addendum, Google Apps Enterprise Online Agreement, Data Processing and Security Terms

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this Google intrusion detection involves: 1. Tightly controlling the size and make-up of Google’s attack surface through preventative measures; 2. Employing intelligent detection controls at data entry points; and 3. Employing technologies that automatically remedy certain dangerous situations.

Appears in 1 contract

Samples: Data Processing Amendment

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this intrusion detection involves: 1. Tightly : (i) tightly controlling the size and make-up of Google’s attack surface through preventative measures; 2. Employing ; (ii) employing intelligent detection controls at data entry points; and 3. Employing and (iii) employing technologies that automatically remedy certain dangerous situations.

Appears in 1 contract

Samples: Google Cloud Platform Terms of Service for G Cloud 14

AutoNDA by SimpleDocs

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this Google intrusion detection involves: 1. Tightly controlling the size and make-up of Google’s the attack surface through preventative measures; 2. Employing intelligent detection controls at data entry points; and 3. Employing technologies that automatically remedy certain dangerous situations.

Appears in 1 contract

Samples: Data Processing Agreement

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this 's intrusion detection involves: 1. Tightly controlling the size and make-up of Google’s attack surface through preventative measures; 2. Employing intelligent detection controls at data entry points; and 3. Employing technologies that automatically remedy certain dangerous situations.

Appears in 1 contract

Samples: Data Processing Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!