Intrusion Prevention Sample Clauses

The Intrusion Prevention clause establishes measures and responsibilities to protect systems and data from unauthorized access or breaches. Typically, it requires parties to implement security protocols such as firewalls, intrusion detection systems, and regular monitoring to detect and prevent cyber intrusions. This clause is essential for safeguarding sensitive information and minimizing the risk of data breaches, thereby ensuring compliance with security standards and protecting both parties from potential harm or liability.
POPULAR SAMPLE Copied 1 times
Intrusion Prevention. Lusha ensures that its security infrastructure is consistent with leading industry standards for virus protection, firewalls and intrusion prevention technologies to prevent any unauthorized access or compromise of Lusha’s network, systems, servers and applications from unauthorized access.
Intrusion Prevention. All systems involved in accessing, storing, transporting, and protecting PII, which are accessible through the Internet, must be protected by an intrusion detection and prevention solution.
Intrusion Prevention. All systems involved in accessing, storing, transporting, and protecting confidential information, which are accessible through the Internet, must be protected by an intrusion detection and prevention solution.
Intrusion Prevention. Abnormal utilizes reasonable measures designed to ensure that its infrastructure protections are consistent with industry standards in preventing unauthorized access to Abnormal networks, servers, and applications. Such measures include but are not limited to the implementation of intrusion prevention technologies, anti-malware services, and firewall rules.
Intrusion Prevention. Service Provider’s responsibilities include the following for host-based firewall Intrusion Prevention systems: 1. Install, update, and configure Intrusion Systems as requested by DIR or DIR Customers. 2. Monitor all Intrusion Systems from central logging system, and provide appropriate response to alerts from Systems based upon mutually agreed procedures as defined in the Service Management Manual. 2.1. Provide immediate notification and historical reporting to DIR and DIR Customers per guidelines in the Service Management Manual. 3. Install as needed or as directed by DIR or DIR Customers, known high-risk updates as defined by intrusion systems manufacturer to intrusion system Software within 4 hours or less after such updates are made available to Service Provider (or qualified Third-Party Vendors selected by Service Provider) and approved by DIR or DIR Customers.
Intrusion Prevention. With Intrusion Prevention, Verizon will detect, alert, and in some cases block attacks (intrusions) on the Customer Network, using intrusion prevention signature files provided by the Managed Device manufacturer. • Encryption. With Encryption, in countries where it is available, Verizon will encrypt Customer application traffic between Managed Devices on the Verizon Private IP Network. Customer will provide at least two additional Managed Devices with the Encryption feature to act as key servers. If circumstances arise that cause the Encryption feature to fail and prevent communication to and from that Managed Device, Customer will notify Verizon. • WAN Acceleration. With WAN Acceleration, Verizon will optimize application traffic using compression, caching protocol optimization where other Sites on the Customer Network have compatible application optimization CPE. • Wireless LAN Controller Management. With Wireless LAN Controller Management, Verizon will configure the Managed Device to provide Wireless LAN controller management capabilities for Customer Sites with compatible access point CPE. • Lightweight Access Point Management. With Access Point Management, Verizon will configure the Managed Device with embedded Access Point functionality such that it will interoperate with Verizon Managed Wireless LAN service.
Intrusion Prevention. The IMS Processing Environment will be protected against the risks of intrusion through the use of suitable software, the effectiveness and updating of which must be checked periodically, in accordance with industry standards.
Intrusion Prevention. Service Provider responsibilities include: 1. Install, update, and configure Intrusion Systems as requested by DIR or DIR Customers. 2. Monitor all Intrusion Systems from central logging system, and provide appropriate response to alerts from Systems based upon mutually agreed procedures as defined in the Service Management Manual. 3. Install as needed or as directed by DIR or DIR Customers, known high-risk updates as defined by intrusion systems manufacturer to intrusion system Software within 4 hours or less after such updates are made available to Service Provider (or qualified Third Party Vendors selected by Service Provider) and approved by DIR Customer.
Intrusion Prevention. (a) Intercom implements and maintains a working network firewall to protect data accessible via the Internet and will keep all Customer Data protected by the firewall at all times. (b) Intercom keeps its systems and software up to date with the latest upgrades, updates, bug fixes, new versions and other modifications necessary to ensure security of the Customer Data. (c) Intercom uses anti-malware software and keeps the anti-malware software up to date.

Related to Intrusion Prevention

  • Intrusion Detection All systems involved in accessing, holding, transporting, and protecting County PHI or PI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.

  • Prevention IP shall take all appropriate measures to prevent sexual exploitation and abuse, and child safeguarding violations, by its employees, personnel or subcontractors. IP shall, inter alia, ensure that its employees, personnel or subcontractors shall have undertaken and successfully completed appropriate training with regard to the prevention of sexual exploitation and abuse, and training on safeguarding children. Such training shall include but not be limited to: reference to definitions of sexual exploitation and sexual abuse, and child safeguarding violations; a clear and unambiguous statement that any form of sexual exploitation and abuse, and any conduct that undermines the safeguarding of children, is prohibited; the requirement that any allegations of sexual exploitation and abuse, or child safeguarding violations be promptly reported as provided for in Article 14.4; and the requirement that alleged victims of sexual exploitation and abuse or child safeguarding violations, be promptly informed of and referred to available professional assistance, upon her or his consent.

  • Fire Prevention LESSEE agrees to use every reasonable precaution against fire and agrees to provide and maintain approved, labeled fire extinguishers, emergency lighting equipment, and exit signs and complete any other modifications within the leased premises as required or recommended by the Insurance Services Office (or successor organization), OSHA, the local Fire Department, or any similar body.

  • ACCIDENT PREVENTION T h i s p r o v i s i o n i s applicable to all Federal-aid construction contracts and to all related subcontracts. 1. In the performance of this contract the contractor shall comply with all applicable Federal, State, and local laws governing safety, health, and sanitation (23 CFR 635). The contractor shall provide all safeguards, safety devices and protective equipment and take any other needed actions as it determines, or as the contracting officer may determine, to be reasonably necessary to protect the life and health of employees on the job and the safety of the public and to protect property in connection with the performance of the work covered by the contract. 2. It is a condition of this contract, and shall be made a condition of each subcontract, which the contractor enters into pursuant to this contract, that the contractor and any subcontractor shall not permit any employee, in performance of the contract, to work in surroundings or under conditions which are unsanitary, hazardous or dangerous to his/her health or safety, as determined under construction safety and health standards (29 CFR 1926) promulgated by the Secretary of Labor, in accordance with Section 107 of the Contract Work Hours and Safety Standards Act (40 U.S.C. 3704). 3. Pursuant to 29 CFR 1926.3, it is a condition of this contract that the Secretary of Labor or authorized representative thereof, shall have right of entry to any site of contract performance to inspect or investigate the matter of compliance with the construction safety and health standards and to carry out the duties of the Secretary under Section 107 of the Contract Work Hours and Safety Standards Act (40 U.S.C.3704).