Network Security. The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.
Network Security. Supplier agrees at all times to maintain network security that, at a minimum, includes: network firewall provisioning, intrusion detection, and regular (at least annual) third party vulnerability assessments. Likewise, Supplier agrees to maintain network security that conforms to generally recognized industry standards (as described in Section C.5) and best practices that Supplier then applies to its own network.
Network Security. 11.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.
11.2 Each Party is responsible to provide security and privacy of communications. This entails protecting the confidential nature of Telecommunications transmissions between End User Customers during technician work operations and at all times. Specifically, no employee, agent or representative shall monitor any circuits except as required to repair or provide service of any End User Customer at any time. Nor shall an employee, agent or representative disclose the nature of overheard conversations, or who participated in such communications or even that such communication has taken place. Violation of such security may entail state and federal criminal penalties, as well as civil penalties. CLEC is responsible for covering its employees on such security requirements and penalties.
11.3 The Parties' Telecommunications networks are part of the national security network, and as such, are protected by federal law. Deliberate sabotage or disablement of any portion of the underlying equipment used to provide the network is a violation of federal statutes with severe penalties, especially in times of national emergency or state of war. The Parties are responsible for covering their employees on such security requirements and penalties.
11.4 CenturyLink and CLEC share responsibility for security and network protection for each Collocation arrangement. Each Party's employees, agents or representatives must secure its own portable test equipment, spares, etc. and shall not use the test equipment or spares of other parties. Use of such test equipment or spares without written permission constitutes theft and may be prosecuted. Exceptions are the use of CenturyLink ladders in the Wire Center, either rolling or track, which CLEC may use in the course of work operations. CenturyLink assumes no liability to CLEC, its agents, employees or representatives, if CLEC uses a CenturyLink ladder available in the Wire Center.
11.5 Each Party is responsible for the physical security of its employees, agents or representatives. Providing safety glasses, gloves, etc. must be done by the respective employing Party. Hazards handling and safety procedures relative to the Telecommunicatio...
Network Security. The Data Importer maintains network security using commercially available equipment and industry standard techniques, including firewalls, intrusion detection systems, access control lists and routing protocols.
Network Security. Contractor agrees at all times to maintain network security that - at a minimum - includes: network firewall provisioning, intrusion detection, and regular third party penetration testing. Contractor also agrees to maintain network security that conforms to one of the following:
(1) Those standards the State of Utah applies to its own network, found outlined in DTS Policy 5000-0002 Enterprise Information Security Policy (copy available upon request);
(2) Current standards set forth and maintained by the National Institute of Standards and Technology, includes those at: xxxx://xxxxxxx.xxxx.xxx/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf; or
(3) Any generally recognized comparable standard that Contractor then applies to its own network and approved by DTS in writing.
Network Security. Seller and Purchaser understand and agree that the State of Mississippi’s Enterprise Security Policy mandates that all remote access to and/or from the State network must be accomplished via a Virtual Private Network (VPN). If remote access is required at any time during the life of this Agreement, Seller and Purchaser agree to implement/maintain a VPN for this connectivity. This required VPN must be IPSec-capable (ESP tunnel mode) and will terminate on a Cisco VPN-capable device ( i.e. VPN concentrator, PIX firewall, etc.) on the State’s premises. Seller agrees that it must, at its expense, implement/maintain a compatible hardware/software solution to terminate the specified VPN on the Seller’s premises. The parties further understand and agree that the State protocol standard and architecture are based on industry-standard security protocols and manufacturer engaged at the time of contract execution. The State reserves the right to introduce a new protocol and architecture standard and require the Seller to comply with same, in the event the industry introduces a more secure, robust protocol to replace IPSec/ESP and/or there is a change in the manufacturer engaged.
Network Security. AWS provides a strong foundation of security and compliance which we supplement by employing industry standard network security controls designed to protect Customer Data, including, but not limited to, the following:
Network Security. Customer acknowledges that a third-party is used by Tyler Technologies to process IVR Data. Customer’s content will pass through and be stored on the third-party servers and will not be segregated or in a separate physical location from servers on which other customers’ content is or will be transmitted or stored.
Network Security. Axis maintains corrective action and incident response plans to respond to potential security threats. The Services handling the transport of personal data is end-to-end encrypted, based on industry standards (HTTPS/TLS RFC 2818/8446) and Axis prevents unauthorized access and eavesdropping to these resources or devices. It is at customers discretion to allow Axis employees explicit time-limited access to personal data, and devices for debugging purposes.
Network Security. Contractor’s network security must include the following:
6.1 Network firewall provisioning;
6.2 Intrusion detection;
6.3 Quarterly vulnerability assessments; and
6.4 Annual penetration tests.