Intrusion Systems Sample Clauses

Intrusion Systems. (1) Schedule a time with OCIT and the onsite contact to perform maintenance. (2) Check in with onsite contact upon arriving at the facility. (3) Perform the following:
AutoNDA by SimpleDocs
Intrusion Systems. Service Provider responsibilities include: 1. Establish processes and procedures in the Service Management Manual with DIR and DIR Customers and the MSI for the management, monitoring, alerting, notifying and reporting of Intrusion Systems. 2. Coordinate and support the monitoring of all intrusion systems from a central logging system, and provide appropriate response to alerts, 7x24x365, based upon mutually agreed procedures.
Intrusion Systems. Service Provider responsibilities include: 1. Establish processes and procedures in the Service Management Manual with DIR and DIR Customers and the MSI for the management, monitoring, alerting, notifying and reporting of Intrusion Systems. 2. Coordinate and support the monitoring of all intrusion systems from a central logging system, and provide appropriate response to alerts, 7x24x365, based upon mutually agreed procedures. 3. Review intrusion systems logs and provide appropriate response to messages including, but not limited to, alerts and access denial messages, based upon mutually agreed procedures. 4. Cooperate and coordinate with the MSI to alert DIR and DIR Customers relative to current intrusion threats either specific to DIR’s and DIR Customers environment, encountered in Service Provider’ environments, or based upon industry information. 5. Install, update and configure Intrusion Systems sensors, and Network Intrusion Systems sensors to inspect all inbound and outbound network activity: 5.1. Identify suspicious patterns that may indicate abnormal activity or intrusion attempts. 5.2. Send alerts to a Service Provider central monitoring facility. 6. Monitor all intrusion devices from the central logging system, and provide appropriate response to alerts, 7x24x365, based upon mutually agreed procedures as defined in the Service Management Manual 7. Review intrusion systems’ logs and provide appropriate response to messages including, but not limited to, alerts and access denial messages based upon mutually agreed procedures as defined in the Service Management Manual. 8. Install as needed or as directed by DIR and DIR Customer, known high-risk updates as defined by intrusion system manufacturers to protection Software, as approved within 4 hours after such updates are made available to Service Provider (or qualified Third Party Vendors selected by the Service Provider) and approved by DIR and DIR Customer. 9. Upon detection of an intrusion alert, take immediate steps to notify DIR, DIR Customer and the Service Desk in compliance with guidelines contained in Exhibit 17 and the Service Management Manual and to: 9.1. Assess the scope of damage. 9.2. Arrest the spread and progressive damage from the intrusion. 9.3. Restore the environment to an operational state. 9.4. In the event of corruption or data loss, restore data from the last available backup. 10. Provide alerts to DIR and DIR Customers relative to current intrusion threats either specific t...

Related to Intrusion Systems

  • Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Sprinkler System If there now is or shall be installed in said building a "sprinkler system" the Tenant agrees to keep the appliances thereto in the demised premises in repair and good working condition, and if the New York Board of Fire Underwriters or the New York Fire Insurance Exchange or any bureau, department or official of the State or local government requires or recommends that any changes, modifications, alterations or additional sprinkler heads or other equipment be made or supplied by reason of the Tenant's business, or the location of partitions, trade fixtures, or other contents of the demised premises, or if such changes, modifications, alterations, additional sprinkler heads or other equipment in the demised premises are necessary to prevent the imposition of a penalty or charge against the full allowance for a sprinkler system in the fire insurance rate as fixed by said Exchange or by any fire insurance company, the Tenant will at the Tenant's own expense, promptly make and supply such changes, modifications, alterations, additional sprinkler head or other equipment. As additional rent hereunder the Tenant will pay to the Landlord, annually in advance, throughout the term 100%, toward the contract price for sprinkler supervisory service.

  • Distribution System The Transmission Owner’s facilities and equipment used to transmit electricity to ultimate usage points such as homes and industries directly from nearby generators or from interchanges with higher voltage transmission networks which transport bulk power over longer distances. The voltage levels at which Distribution Systems operate differ among areas. Distribution Upgrades – The additions, modifications, and upgrades to the Transmission Owner’s Distribution System at or beyond the Point of Interconnection to facilitate interconnection of the Small Generating Facility and render the transmission service necessary to effect the Interconnection Customer’s wholesale sale of electricity in interstate commerce.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • PFPC System PFPC shall retain title to and ownership of any and all data bases, computer programs, screen formats, report formats, interactive design techniques, derivative works, inventions, discoveries, patentable or copyrightable matters, concepts, expertise, patents, copyrights, trade secrets, and other related legal rights utilized by PFPC in connection with the services provided by PFPC to the Fund.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins. (2) Maintain waterbars, drainage dips, and other water diversion measures. (3) During active use, patrol and maintain functional drainage. (4) Repair damaged culvert ends.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!