Regularly Monitor and Test Networks Sample Clauses

Regularly Monitor and Test Networks. MUIS will use industry standard practices to protect its telecommunications systems and any computer system or network device(s) it uses to provide services hereunder to access provider systems and networks. These controls will be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: o protecting against intrusions of operating systems or software o securing the computer systems and network devices
AutoNDA by SimpleDocs
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning). 6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: • protecting against intrusions; • securing the computer systems and network devices; • and protecting against intrusions of operating systems or software.
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, internal/external vulnerability scanning). Ensure that issues identified via testing are remediated according to the issue severity (e.g. fix critical issues immediately, high severity in 15 days, etc.) 6.2 Ensure that audit trails are enabled and active for systems and applications used to access, store, process, or transmit Experian data; establish a process for linking all access to such systems and applications. Ensure that security policies and procedures are in place to review security logs on daily or weekly basis and that follow-up to exceptions is required. 6.3 Use current best practices to protect telecommunications systems and any computer system or network device(s) used to provide Services hereunder to access ACRAnet systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: • protecting against intrusions; • securing the computer systems and network devices; • and protecting against intrusions of operating systems or software.
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning.) 6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by protecting against intrusions; securing the computer systems and network devices; and protecting against intrusions of operating systems or software. 000 Xxxxx Xxxxxx Xxxxx 000  Xxxxxx, Xxxxxxx 00000  V: (000) 000-0000 F: (000) 000-0000  0-000-000-0000 Please type or print ALL information requested. This will aid us in processing your application for membership as quickly as possible. COMPANY NAME: DBA (If Applicable) ADDRESS: LANDLINE TELEPHONE: IN BUSINESS SINCE (mm/yy): FAX: COMPANY WEBSITE: BUSINESS LOCATION: COMMERCIAL RESIDENTIAL TYPE OF BUSINESS:  PARTNERSHIP  SOLE OWNER  CORPORATION  LLC NAME OF PARENT OR AFFILIATE COMPANY _ ADDRESS PRIMARY CONTACT: TITLE: DIRECT PHONE: EMAIL: ALTERNATE CONTACT: TITLE: DIRECT PHONE: EMAIL: PURPOSE(S) FOR WHICH CREDIT INFORMATION WILL BE USED TYPE OF BUSINESS SERVICES OFFERED/PRODUCTS SOLD ESTIMATED MONTHLY CREDIT INQUIRIES OTHER CREDIT AGENCIES USED MONTHLY BILLING TO BE SENT TO: ADDRESS: NAME AS IT APPEARS ON CARD: BILLING ADDRESS: CREDIT CARD NUMBER EXPIRATION DATE (MM/YY) Name Position SS# Home Address Previous Address I certify that I am the person named above. As a principal of I authorize Merchants Credit Bureau to review my own personal credit profile to be used only in conjunction with this application for company membership, and agree to act as a personal guarantor. I authorize the release of information on the accounts and references listed below. Signature/Title Name Position SS# Home Address Previous Address I certify that I am the person named above. As a principal of I authorize Merchants Credit Bureau to review my own personal credit profile to be used only in conjunction with this application for company membership, and agree to act as a personal guarantor. I authorize the release of information on the accounts and references listed below. Bank References: Branch Phone: Type of Account: Account Number Bank Reference: Branch Phone: Type of Account: Account Number 1. Company Name Admin. Phone ( ) Company Address 2. Company N...
Regularly Monitor and Test Networks. Per NCC’s Information Security Policy, NCC will perform regular tests on information systems (port scanning, virus scanning, internal/external vulnerability scanning). Ensure that issues identified via testing are remediated according to the issue severity (e.g. fix critical issues immediately, high severity in 15 days, etc.). Logs will be maintained for 90 days online and 1 year archived. Audit trails will be enabled and active for systems and applications used to access, store, process, or transmit Credit Bureau Data establish a process for linking all access to such systems and applications. Use current best practices to protect telecommunications systems and any computer system or network device(s) used to provide Services hereunder to access Credit Bureau systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: a. Protecting against intrusions b. Securing the computer systems and network devices c. Protecting against intrusions of operating systems or software.
Regularly Monitor and Test Networks a. Tracking and monitoring access to TMUS's network resources and Company Data. b. Regularly testing security systems and processes.
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning). 6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by:  protecting against intrusions;  securing the computer systems and network devices;  and protecting against intrusions of operating systems or software. CSI, TransUnion, Equifax and/or Experian may require periodic compliance reviews. The End-User is expected to be prompt in response to these compliance reviews to avoid suspension of their access to credit information. During a compliance review, the End-User will be asked to provide documents to support two key points: 1. Consumer information was obtained for the permissible purpose indicated. 2. Consumer information was used by the company End-User indicated. The documents that may be acceptable in response to a compliance review include:  Employment Application  Signed Disclosure/Acknowledgement Form and/or Release/Authorization Form This Addendum A may be executed in any number of counterparts, each of which shall be deemed an original, but all of which taken together shall constitute one and the same instrument. A signature on a copy of this Agreement received by facsimile or electronically is binding as an original. The parties shall treat a photocopy of such facsimile as a duplicate original. The individuals signing below represent that they are duly authorized to do so and have direct knowledge of all facts certified.
AutoNDA by SimpleDocs
Regularly Monitor and Test Networks. CLIENT understands and agrees that they must perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning). Use current best practices to protect their telecommunications systems and any computer system or network device(s) used to provide services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: ● Protecting against intrusions ● Securing the computer systems and network devices ● Protecting against intrusions of operating systems or software
Regularly Monitor and Test Networks. 1. Track and monitor all access to network resources and cardholder data 2. Regularly test security systems and processes

Related to Regularly Monitor and Test Networks

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • PERFORMANCE MANAGEMENT SYSTEM 6.1 The Performance Plan (Annexure A) to this Agreement sets out – 6.1.1 The standards and procedures for evaluating the Employee’s performance; and 6.1.2 The intervals for the evaluation of the Employee’s performance. 6.2 Despite the establishment of agreed intervals for evaluation, the Employer may in addition review the Employee’s performance at any stage while the contract of employment remains in force; 6.3 Personal growth and development needs identified during any performance review discussion must be documented in a Personal Development Plan as well as the actions agreed to and implementation must take place within set time frames; 6.4 The Employee’s performance will be measured in terms of contributions to the goals and strategies set out in the Employer’s Integrated Development Plan (IDP) as described in 6.6 – 6.12 below; 6.5 The Employee will submit quarterly performance reports (SDBIP) and a comprehensive annual performance report at least one week prior to the performance assessment meetings to the Evaluation Panel Chairperson for distribution to the panel members for preparation purposes; 6.6 Assessment of the achievement of results as outlined in the performance plan: 6.6.1 Each KPI or group of KPIs shall be assessed according to the extent to which the specified standards or performance targets have been met and with due regard to ad-hoc tasks that had to be performed under the KPI, and the score of the employer will be given to and explained to the Employee during the assessment interview. 6.6.2 A rating on the five-point scale shall be provided for each KPI or group of KPIs which will then be multiplied by the weighting to calculate the final score; 6.6.3 The Employee will submit his self-evaluation to the Employer prior to the formal assessment; 6.6.4 In the instance where the employee could not perform due to reasons outside the control of the employer and employee, the KPI will not be considered during the evaluation. The employee should provide sufficient evidence in such instances; and 6.6.5 An overall score will be calculated based on the total of the individual scores calculated above.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!