Network Controls Sample Clauses

Network Controls. Contractor shall have, shall implement, and shall maintain network security controls, including the use of firewalls, layered DMZs and updated intrusion detection and prevention systems, reasonably designed to protect systems from intrusion or limit the scope or success of any attack or attempt at unauthorized access to City Data.
AutoNDA by SimpleDocs
Network Controls. Genesys will employ effective network security controls based on industry standards to ensure that Customer Data is segmented and isolated from other customer environments within the Data Center. Controls include, but are not limited to: A) Segregated Firewall Services. Customer environments are segmented using physical and contextual firewall instances.
Network Controls. Supplier shall manage and control networks in order to protect UL Solutions from threats and to maintain security for the network, including information in transit. Supplier shall implement controls to ensure the security of information in networks and the protection of connected services from unauthorized access. Controls shall be implemented to ensure the availability of network services and information services using the network. Responsibilities and procedures shall be established for the management of equipment on the network, including equipment in user areas.
Network Controls. Data importer will secure all data and communications networks to ensure the protection of Personal Data.
Network Controls i) Vendor shall implement appropriate controls to ensure that only authorized devices are provisioned network access when physically connected to the network. ii) As necessary, Vendor shall provision logically or physically segregated network to allow guest access for visitors to their facilities. In no case shall Vendor allow guests, or other non-Vendor managed and controlled personnel, access to production networks. iii) Vendor shall implement technical controls to filter inappropriate and unnecessary web content including, but not limited to, pornography, gambling, violence, webmail, social media, etc. iv) All Vendor controlled wireless connections shall be secured utilizing Wi-Fi Protected Access 2 (“WPA2”) or better security protocol. v) Vendor shall ensure that interconnections within Vendor, with other companies, and with the Internet (“Access Points”), whether wired or wireless, into the Vendor network are protected by using firewalls, secure tunnels, and/or access lists on routers. vi) Vendor shall ensure that a network management system is used to monitor its local network and servers. Thresholds and alarms shall be established to notify Vendor of potential problems or outages. vii) Vendor shall implement either host-based or network-based Intrusion Detection Solution (“IDS”) or Intrusion Protection Solution (“IPS”) on any Vendor controlled network used to process, store, transmit, or access Customer Confidential Information. Appropriate response and recovery plans to monitor potential unauthorized access to said network and systems shall be implemented. viii) Vendor shall implement a Data Loss Prevention system (“DLP”) to prevent the accidental or intentional distribution of Customer Confidential Information. ix) Vendor shall secure all unused network ports.
Network Controls. Networks are managed and controlled to protect information in systems and applications.
Network Controls. Jostens ensures that all data and communications networks are secured to ensures the transmission of data is kept confidential. a. Applications, ports, services, and similar access points installed on a computer or network facility, which are not specifically required for business functionality, are disabled or removed; b. Network segments connected to the Internet are protected by a firewall which is configured to secure all devices behind it; c. Network segments where Jostens data resides are isolated from non-Jostens data, logically or physically unless approved by Jostens Security; d. User connection capability are documented with regard to messaging, electronic mail, file transfer, interactive access, and application access; e. All production servers are located in a secure, access-controlled location; f. Firewalls are configured properly to address all reasonably-known security concerns; g. Infrastructure diagrams, documentation, and configurations are up to date, controlled and available to assist in issue resolution; and h. Systems must have the ability to detect a potential hostile attack. (e.g., IDS/IPS) i. All systems are updated to the current release and actively monitored.
AutoNDA by SimpleDocs
Network Controls. A current telecommunication network diagram shall be maintained. The telecommunication network diagram shall document all internal and external connections to TSM systems storing, processing or transmitting information (e.g., PII, ePHI). The diagram shall also include authorized wireless networks and Wireless Access Points (WAP). [Core-15(b)] The telecommunications network diagram shall be reviewed and updated based on the changes in the environment and no less than every 6 months. [Core-15(b)] TSM management shall implement telecommunications network controls to ensure the security of the IT assets and the protection of connected systems and active services from Policy No.: ISP#13 Page 63 Effective Date: 09/01/2016 Approval Date: 09/01/2016 Department: Information Security Last Review Date: 08/11/2016 Policy Name: Network Security unauthorized access as well as to ensure the availability of the required telecommunication network services in order to support the organization Business Continuity and Disaster Recovery strategy. [Core-15(b)]

Related to Network Controls

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • TIA Controls If any provision of this Indenture limits, qualifies, or conflicts with another provision which is required to be included in this Indenture by the TIA, the required provision shall control.

  • Accounting Controls The Company and its Subsidiaries maintain systems of “internal control over financial reporting” (as defined under Rules 13a-15 and 15d-15 under the Exchange Act Regulations) that comply with the requirements of the Exchange Act and have been designed by, or under the supervision of, their respective principal executive and principal financial officers, or persons performing similar functions, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with GAAP, including, but not limited to, internal accounting controls sufficient to provide reasonable assurance that (i) transactions are executed in accordance with management’s general or specific authorizations; (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with GAAP and to maintain asset accountability; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. Except as disclosed in the Registration Statement, the Pricing Disclosure Package and the Prospectus, the Company is not aware of any material weaknesses in its internal controls. The Company’s auditors and the Audit Committee of the Board of Directors of the Company have been advised of: (i) all significant deficiencies and material weaknesses in the design or operation of internal controls over financial reporting which are known to the Company’s management and that have adversely affected or are reasonably likely to adversely affect the Company’ ability to record, process, summarize and report financial information; and (ii) any fraud known to the Company’s management, whether or not material, that involves management or other employees who have a significant role in the Company’s internal controls over financial reporting.

  • Exchange Controls As a condition to this grant of Units, the Employee agrees to comply with any applicable foreign exchange rules and regulations.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Internal Controls The Company shall maintain a system of internal accounting controls sufficient to provide reasonable assurances that: (i) transactions are executed in accordance with management’s general or specific authorization; (ii) transactions are recorded as necessary in order to permit preparation of financial statements in accordance with GAAP and to maintain accountability for assets; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

  • Sxxxxxxx-Xxxxx; Internal Accounting Controls The Company and the Subsidiaries are in compliance with any and all applicable requirements of the Sxxxxxxx-Xxxxx Act of 2002 that are effective as of the date hereof, and any and all applicable rules and regulations promulgated by the Commission thereunder that are effective as of the date hereof and as of the Closing Date. The Company and the Subsidiaries maintain a system of internal accounting controls sufficient to provide reasonable assurance that: (i) transactions are executed in accordance with management’s general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with GAAP and to maintain asset accountability, (iii) access to assets is permitted only in accordance with management’s general or specific authorization, and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. The Company and the Subsidiaries have established disclosure controls and procedures (as defined in Exchange Act Rules 13a-15(e) and 15d-15(e)) for the Company and the Subsidiaries and designed such disclosure controls and procedures to ensure that information required to be disclosed by the Company in the reports it files or submits under the Exchange Act is recorded, processed, summarized and reported, within the time periods specified in the Commission’s rules and forms. The Company’s certifying officers have evaluated the effectiveness of the disclosure controls and procedures of the Company and the Subsidiaries as of the end of the period covered by the most recently filed periodic report under the Exchange Act (such date, the “Evaluation Date”). The Company presented in its most recently filed periodic report under the Exchange Act the conclusions of the certifying officers about the effectiveness of the disclosure controls and procedures based on their evaluations as of the Evaluation Date. Since the Evaluation Date, there have been no changes in the internal control over financial reporting (as such term is defined in the Exchange Act) of the Company and its Subsidiaries that have materially affected, or is reasonably likely to materially affect, the internal control over financial reporting of the Company and its Subsidiaries.

  • Xxxxxxxx-Xxxxx; Internal Accounting Controls The Company and the Subsidiaries are in compliance with any and all applicable requirements of the Xxxxxxxx-Xxxxx Act of 2002 that are effective as of the date hereof, and any and all applicable rules and regulations promulgated by the Commission thereunder that are effective as of the date hereof and as of the Closing Date. The Company and the Subsidiaries maintain a system of internal accounting controls sufficient to provide reasonable assurance that: (i) transactions are executed in accordance with management’s general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with GAAP and to maintain asset accountability, (iii) access to assets is permitted only in accordance with management’s general or specific authorization, and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. The Company and the Subsidiaries have established disclosure controls and procedures (as defined in Exchange Act Rules 13a-15(e) and 15d-15(e)) for the Company and the Subsidiaries and designed such disclosure controls and procedures to ensure that information required to be disclosed by the Company in the reports it files or submits under the Exchange Act is recorded, processed, summarized and reported, within the time periods specified in the Commission’s rules and forms. The Company’s certifying officers have evaluated the effectiveness of the disclosure controls and procedures of the Company and the Subsidiaries as of the end of the period covered by the most recently filed periodic report under the Exchange Act (such date, the “Evaluation Date”). The Company presented in its most recently filed periodic report under the Exchange Act the conclusions of the certifying officers about the effectiveness of the disclosure controls and procedures based on their evaluations as of the Evaluation Date. Since the Evaluation Date, there have been no changes in the internal control over financial reporting (as such term is defined in the Exchange Act) of the Company and its Subsidiaries that have materially affected, or is reasonably likely to materially affect, the internal control over financial reporting of the Company and its Subsidiaries.

  • Internal Accounting Controls The Company and each of its subsidiaries maintain a system of internal accounting controls sufficient to provide reasonable assurance that (i) transactions are executed in accordance with management's general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with generally accepted accounting principles and to maintain asset accountability, (iii) access to assets is permitted only in accordance with management's general or specific authorization and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

  • Disclosure Controls The Company and its subsidiaries maintain an effective system of “disclosure controls and procedures” (as defined in Rule 13a-15(e) of the Exchange Act) that complies with the requirements of the Exchange Act and that has been designed to ensure that information required to be disclosed by the Company in reports that it files or submits under the Exchange Act is recorded, processed, summarized and reported within the time periods specified in the Commission’s rules and forms, including controls and procedures designed to ensure that such information is accumulated and communicated to the Company’s management as appropriate to allow timely decisions regarding required disclosure. The Company and its subsidiaries have carried out evaluations of the effectiveness of their disclosure controls and procedures as required by Rule 13a-15 of the Exchange Act.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!