Network Security Controls Sample Clauses

Network Security Controls. Data Importer's information systems have security controls designed to detect and mitigate attacks by using logs and alerting.
AutoNDA by SimpleDocs
Network Security Controls. Provider’s information systems have security controls designed to detect and mitigate attacks by using logs and alerting.
Network Security Controls. 81 7. DEFINITIONS..................................................................... 81 Page 71 of 163 EXHIBIT 10.23
Network Security Controls. 10.1. Vendor shall protect Confidential Information in its networks against unauthorized access or modification, by using, network security devices, such as firewalls and intrusion detection and prevention systems, at critical junctures of Vendor’s IT infrastructure to protect the network perimeters. 10.2. Vendor shall use up-to-date versions of system security software including firewalls, proxies, web application firewalls and interfaces. Additionally, Vendor shall implement and maintain up-to-date antivirus software, malware protection, security updates, patches, and virus definitions consistent with industry recognized standards. Such software shall be installed and running to scan for and promptly remove viruses on all endpoints, servers and networks. 10.3. Vendor shall maintain a patch management process that requires that patches are tested before installation on all systems that Process Confidential Information or are used to deliver services to Entrust. 10.4. Vendor shall ensure that system administrators maintain complete, accurate, and up-to-date information regarding the configuration of all systems that handle Confidential Information. 10.5. Vendor shall maintain controls to ensure the timely identification of vulnerabilities in Vendor’s information systems, including intrusion detection and/or prevention and monitoring and response processes, which identify both internal and external vulnerabilities and risks. At least monthly, Vendor shall scan its information systems with industry-standard security vulnerability scanning software to detect security vulnerabilities. Vendor shall classify detected vulnerabilities according to CVSS and shall remediate any such vulnerabilities within commercially reasonable timeframes commensurate with the risk or severity rating. 10.6. Vendor shall subscribe to vulnerability intelligence services that provide current information about technology and security vulnerabilities. 10.7. Vendor shall refrain from storing Confidential Information on media connected to external networks unless necessary for business purposes. 10.8. Vendor shall log network and remote access attempts and maintain those logs for a minimum of six (6) months.
Network Security Controls. Smartnova’s information systems have security controls designed to detect and mitigate attacks by using logs and alerting;

Related to Network Security Controls

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Plan Controls The terms contained in the Plan are incorporated into and made a part of this Agreement and this Agreement shall be governed by and construed in accordance with the Plan. In the event of any actual or alleged conflict between the provisions of the Plan and the provisions of this Agreement, the provisions of the Plan shall be controlling and determinative.

  • Indenture Controls If and to the extent that any provision of the Notes limits, qualifies or conflicts with a provision of this Indenture, such provision of this Indenture shall control.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!