Common use of Secure Configuration for Hardware and Software on Mobile Devices Clause in Contracts

Secure Configuration for Hardware and Software on Mobile Devices. Laptops, Workstations, and Servers Implement and actively manage (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.

Appears in 5 contracts

Samples: Data Protection Agreement, Data Protection Agreement, www.teletracnavman.co.uk

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.