Secure Configuration for Hardware and Software on Mobile Devices. Laptops, Workstations, and Servers Implement and actively manage (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.
Appears in 5 contracts
Samples: Data Processing Addendum, Data Protection Agreement, Data Protection Agreement