Common use of Network/Communication security Clause in Contracts

Network/Communication security. a. Whenever access is performed through the Internet, communication is encrypted through cryptographic protocols. b. Traffic to and from the IT system is monitored and controlled through Firewalls and Intrusion Detection Systems.

Appears in 6 contracts

Sources: Supplier Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

Network/Communication security. a. i. Whenever access is performed through the Internet, communication is encrypted through cryptographic protocols. b. ii. Traffic to and from the IT system is monitored and controlled through Firewalls and Intrusion Detection Systems.

Appears in 2 contracts

Sources: Trustbuilder Terms and Conditions, Trustbuilder Terms and Conditions

Network/Communication security. a. Whenever access (a) Every time the Internet is performed through the Internetaccessed, communication is encrypted through using cryptographic protocols. b. (b) Traffic to and from the IT system is monitored and controlled through Firewalls by firewalls and Intrusion Detection Systemsintrusion detection systems.

Appears in 1 contract

Sources: Order Processing Contract

Network/Communication security. a. a) Whenever access is performed through the Internet, communication is encrypted through cryptographic protocols. b. b) Traffic to and from the IT system is monitored and controlled through Firewalls firewalls and Intrusion Detection Systemsintrusion detection systems.

Appears in 1 contract

Sources: Data Processing Agreement

Network/Communication security. a. 1. Whenever access is performed through the Internet, communication is encrypted through cryptographic protocols. b. 2. Traffic to and from the IT system is monitored and controlled through Firewalls firewalls and Intrusion Detection Systemsintrusion detection systems.

Appears in 1 contract

Sources: Data Processing Agreement