Network and Communications Security Sample Clauses

Network and Communications Security. A. Asset Management. BNYM will maintain an inventory of its system components, hardware and software used to provide the services, and will review and update such inventory in accordance with the ISP.
AutoNDA by SimpleDocs
Network and Communications Security. 2.1 All Processor connectivity to Controller computing systems and/or networks and all attempts at same shall be only through Controller’s security gateways/firewalls and only through Controller-approved security procedures. 2.2 Processor will not access, and will endeavor its best efforts to prevent unauthorized persons or entities to access,Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization. 2.3 Processor will take appropriate measures to ensure that Processor’s systems connecting to Controller’s systems and anything provided to Controller through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Controller’s systems. 2.4 Processor will maintain technical and organizational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
Network and Communications Security. 2.1 All Processor connectivity to Controller computing systems and/or networks and all attempts at same shall be only through Controller’s security gateways/firewalls and only through Controller-approved security procedures. 2.2 Processor shall not access and will not permit unauthorized persons or entities to access Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization. 2.3 Processor shall take appropriate measures to ensure that Processor’s systems connecting to Controller’s systems and anything provided to Controller through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Controller’s systems. 2.4 Processor shall maintain technical and organisational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
Network and Communications Security. A. Asset Management. BNY Mellon will maintain an inventory of its system components, hardware and software used to provide the services under the Agreement, and will review and update such inventory in accordance with the ISP.
Network and Communications Security. Each Party shall deploy security controls in a multi-layered approach, including intrusion detection and anti-virus systems. All security control layers shall log and notify any unusual activity twenty-four (24) hours per day, three hundred sixty five (365) days a year. Administrators shall review logs regularly (at least monthly) and respond to alerts within a reasonable amount of time. Logs shall be archived onto a write once/read only media for a reasonable amount of time and be accessible for investigation purposes.
Network and Communications Security. Markit shall: 2.1 Deploy multiple layers of defence on Markit’s systems including firewalls, network intrusion detection, and host-based intrusion detection systems. All security monitoring systems, including firewalls and intrusion detection systems, must be monitored twenty-four (24) hours per day, three hundred and sixty-five (365) days per year. 2.2 Notify Subscriber as soon as commercially feasible and provide Subscriber, within 5 days of the closure of the incident, if an incident takes place that involves the systems, employees or software used to provide goods and/or services to Subscriber and provide Subscriber with a written report describing the incident, actions taken during the response, and plans for future actions to prevent a similar incident from occurring in thefuture. 2.3 Configure its firewalls, network routers, switches, load balancers, name servers, mail servers, and other network components in accordance with industry best practices. 2.4 Where Subscriber so requests upon reasonable grounds, and based upon information received by Subscriber about specific and realistic vulnerabilities and threats, to restrict access within Markit to any Subscriber-specific component (if any) of Markit’s networks, systems, and applications used to provide the Services. 2.5 Deploy firewalls, filtering routers, or other similar network segmentation devices between networks providing services anticipated by this agreement and other Markit networks to control network traffic and minimise exposure to a network compromise.
Network and Communications Security. 2.1 All Data Importer connectivity to Data Exporter computing systems and/or networks and all attempts at same shall be only through Data Exporter’s security gateways/firewalls and only through Data Exporter-approved security procedures. 2.2 Data Importer shall not access, and will not permit unauthorized persons or entities to access Data Exporter computing systems and/or networks without Data Exporter’s express written authorization and any such actual or attempted access shall be consistent with any such authorization. 2.3 Data Importer shall take appropriate measures to ensure that Data Importer’s systems connecting to Data Exporter’s systems and anything provided to Data Exporter through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Data Exporter’s systems. 2.4 Data Importer shall maintain technical and organisational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
AutoNDA by SimpleDocs
Network and Communications Security. 2.1 All Processor connectivity to Controller computing systems and/or networks and all attempts at same shall be only through Controller’s security gateways/firewalls and only through Controller- approved security procedures. 2.2 Processor shall not access and will not permit unauthorized persons or entities to access Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization. 2.3 Processor shall take appropriate measures to ensure that Processor’s systems connecting to Controller’s systems and anything provided to Controller through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Controller’s systems. 2.4 Processor shall maintain technical and organisational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, DocuSign Envelope ID: C4A38869-A3F1-4CE0-B47A-92E708DD700D viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
Network and Communications Security. 2.1 Except in the ordinary course of providing the System as anticipated under the Agreement, SunGard and its personnel will not access Customer computing systems and/or networks without Customer’s authorization and any such actual or attempted access shall be consistent with any such authorization. 2.2 To the extent commercially available, SunGard shall use industry standard tools on the System, as well as on SunGard-managed networks that are used in providing the System, to ensure that the System does not contain any computer code, programs, mechanisms or programming devices designed to disrupt, unintentionally modify or delete, damage, deactivate, disable, harm or otherwise impede, in any manner, the operation of the System or Customer’s systems which connect to the System. For the avoidance of doubt, the foregoing shall not preclude SunGard from including in the System features and functionality that may restrict use for security purposes or to enforce any contractual scope of use.
Network and Communications Security. 2.1 Processor shall not access and will not permit unauthorized persons or entities to access Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization. 2.2 Processor shall take appropriate measures to ensure that Processor’s systems connecting to Controller’s systems and anything provided to Controller through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Controller’s systems. 2.3 Processor shall maintain technical and organizational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!