Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this involves: 1. Tightly controlling the size and make-up of Google’s attack surface through preventative measures; 2. Employing intelligent detection controls at data entry points; and 3. Employing technologies that automatically remedy certain dangerous situations.
Appears in 4 contracts
Samples: Google Apps for Education Agreement, Google Apps for Education Agreement, Google Apps for Education Agreement
Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this intrusion detection involves:
1. Tightly controlling the size and make-up of Google’s attack surface through preventative measures;
2. Employing intelligent detection controls at data entry points; and
3. Employing technologies that automatically remedy certain dangerous situations.
Appears in 3 contracts
Samples: California Student Data Privacy Addendum, Google Apps Enterprise Online Agreement, Data Processing and Security Terms
Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this Google intrusion detection involves:
1. Tightly controlling the size and make-up of Google’s attack surface through preventative measures;
2. Employing intelligent detection controls at data entry points; and
3. Employing technologies that automatically remedy certain dangerous situations.
Appears in 1 contract
Samples: Data Processing Amendment
Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this intrusion detection involves:
1. Tightly : (i) tightly controlling the size and make-up of Google’s attack surface through preventative measures;
2. Employing ; (ii) employing intelligent detection controls at data entry points; and
3. Employing and (iii) employing technologies that automatically remedy certain dangerous situations.
Appears in 1 contract
Samples: Google Cloud Platform Terms of Service for G Cloud 14
Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this Google intrusion detection involves:
1. Tightly controlling the size and make-up of Google’s the attack surface through preventative measures;
2. Employing intelligent detection controls at data entry points; and
3. Employing technologies that automatically remedy certain dangerous situations.
Appears in 1 contract
Samples: Data Processing Agreement
Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this 's intrusion detection involves:
1. Tightly controlling the size and make-up of Google’s attack surface through preventative measures;
2. Employing intelligent detection controls at data entry points; and
3. Employing technologies that automatically remedy certain dangerous situations.
Appears in 1 contract
Samples: Data Processing Agreement