Common use of Secure Configuration for Hardware and Software on Mobile Devices Clause in Contracts

Secure Configuration for Hardware and Software on Mobile Devices. Laptops, Workstations, and Servers Implement and actively manage (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.

Appears in 5 contracts

Samples: Data Processing Addendum, Data Protection Agreement, Data Protection Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!