Network Security. The Data Importer maintains network security using commercially available equipment and industry standard techniques, including firewalls, intrusion detection systems, access control lists and routing protocols.
Appears in 7 contracts
Samples: Clinical Trial Agreement, Clinical Trial Agreement, Clinical Trial Agreement
Network Security. The Data Importer data importer maintains network security using commercially available equipment and industry standard techniques, including firewalls, intrusion detection systems, and prevention systems and access control lists and routing protocolslists.
Appears in 4 contracts
Samples: Software as a Service Agreement, Software as a Service Agreement, Software as a Service Agreement
Network Security. The Data Importer maintains network security using commercially available equipment and industry standard techniques, including firewalls, intrusion detection and/or prevention systems, access control lists and routing protocols.
Appears in 2 contracts
Samples: Data Processing Agreement, Data Processing Addendum
Network Security. The Data Importer maintains network security using commercially available equipment measures and industry standard techniques, including firewalls, intrusion detection systems, systems and access control lists and routing protocolslists.
Appears in 1 contract
Samples: Master Service Agreement
Network Security. The Data Importer maintains network security using commercially available equipment and industry monitoring techniques that are designed to provide multiple layers of protection and defense. Data Importer employs industry-standard protection techniques, including firewalls, network security monitoring, and intrusion detection systems, access control lists and routing protocolssystems to ensure only eligible traffic is able to reach Data Importer’s infrastructure.
Appears in 1 contract
Samples: Data Processing Agreement
Network Security. The Data Importer importer maintains network security using commercially available equipment and industry standard techniques, including firewalls, intrusion detection systems, and prevention systems and access control lists and routing protocolslists.
Appears in 1 contract
Samples: Hosting Services Agreement