Network/Communication security. a. Whenever access is performed through the Internet, communication is encrypted through cryptographic protocols. b. Traffic to and from the IT system is monitored and controlled through Firewalls and Intrusion Detection Systems.
Appears in 6 contracts
Sources: Supplier Data Processing Agreement, Data Processing Agreement, Data Processing Agreement
Network/Communication security. a. i. Whenever access is performed through the Internet, communication is encrypted through cryptographic protocols.
b. ii. Traffic to and from the IT system is monitored and controlled through Firewalls and Intrusion Detection Systems.
Appears in 2 contracts
Sources: Trustbuilder Terms and Conditions, Trustbuilder Terms and Conditions
Network/Communication security. a. Whenever access (a) Every time the Internet is performed through the Internetaccessed, communication is encrypted through using cryptographic protocols.
b. (b) Traffic to and from the IT system is monitored and controlled through Firewalls by firewalls and Intrusion Detection Systemsintrusion detection systems.
Appears in 1 contract
Sources: Order Processing Contract
Network/Communication security. a. a) Whenever access is performed through the Internet, communication is encrypted through cryptographic protocols.
b. b) Traffic to and from the IT system is monitored and controlled through Firewalls firewalls and Intrusion Detection Systemsintrusion detection systems.
Appears in 1 contract
Sources: Data Processing Agreement
Network/Communication security. a. 1. Whenever access is performed through the Internet, communication is encrypted through cryptographic protocols.
b. 2. Traffic to and from the IT system is monitored and controlled through Firewalls firewalls and Intrusion Detection Systemsintrusion detection systems.
Appears in 1 contract
Sources: Data Processing Agreement