Common use of Security Access and Fraud Clause in Contracts

Security Access and Fraud. 5.4.1 Rogers shall limit access to Managed Firewall Services and take reasonable security efforts to prevent unauthorized access to the Managed Firewall platform. You are solely responsible for End User access security or network access security with respect to your data. 5.4.2 Rogers shall use best practices to reasonably assist in network security breach detection or identification. Rogers provides absolutely no guarantees in relation to its efforts to identify security breaches and is not liable for any security breach that occurs despite its efforts. Rogers’ access control management policies ensure that Managed Firewall Services will utilize controls and logging in the IP Portal. Upon implementation of the order, you will identify all user management rules for the account. This will include identifying which individuals have access to account administrative, security, technical and billing rights. Changes to the access controls require the provision of your designated secure username and password. Credentials designated by you must utilize strong security traits (e.g. upper- and lower-case values, numeric and non- numeric values). You are responsible for credentials and must keep credentials secure and confidential. 5.4.3 Rogers will track all access to your Services through the IP Portal and will ensure that they have all your necessary documented approvals prior to accessing or changing your Services. 5.4.4 In the event of any emergency that presents a substantial risk of a service outage, or damage to Rogers Equipment or data belonging to Rogers, a third party, data center facilities, or to any persons or property present therein, Rogers shall take all reasonable measures to respond to the emergency; and only as necessary, Rogers may disable Managed Firewall Services if the emergency requires such action to avoid damage. 5.4.5 You agree to co-operate and assist Rogers with any investigation or action taken in relation to Rogers’ operations and provisioning of Services, confirmation of Your compliance with the Agreement and, or breach of the Agreement by you. 5.4.6 You are not permitted to run security penetration tests on the Managed Firewall Services without written approval from Rogers and any such actions will be considered improper use under the Agreement. Rogers may, without liability, restrict Managed Firewall Services platform access if you perform invasive platform testing without written approval.

Appears in 3 contracts

Samples: Rogers for Business Agreement, Rogers for Business Agreement, Rogers for Business Agreement

AutoNDA by SimpleDocs

Security Access and Fraud. 5.4.1 6.1. You agree to implement, and is wholly responsible for implementing, security precautions and practices in relation to the use of the Services. You are solely responsible for any non-physical security breach or unauthorized usage of the Services, Customer Equipment, including unmanaged Rogers Equipment, and your accounts. 6.2. Rogers shall limit access to Managed Firewall Services the Space and take reasonable security efforts to prevent unauthorized access to the Managed Firewall platformCustomer Equipment. You are solely responsible for End User access security or network access security with respect to your data. 5.4.2 Rogers shall use best practices to may reasonably assist in network security breach detection or identification, but shall not be liable for any inability, failure or mistake in doing so. Notwithstanding any action of Rogers, you are solely responsible for security of your data. 6.3. Rogers will utilize best practices, as determined by Rogers, to identify security breaches. Rogers provides absolutely no guarantees in relation to its efforts to identify security breaches and is not liable for any security breach that occurs despite its efforts. 6.4. Rogers’ access control management policies ensure You will provide Access Control and User Management Controls and rules to Rogers that Managed Firewall Services will utilize controls and logging in the IP Portal. Upon implementation of the order, you will identify all user management rules for the account. This will include identifying which individuals that have access to the Space, account administrativeadministration, security, technical and, or billing rights (“Access Control and billing rightsUser Management Controls”). 6.5. Changes to the access controls Customer Access Control and User Management Controls require the provision of your designated a secure username user name and passwordpassword designed by you. Credentials designated by you must utilize strong security traits (e.g. upper- upper and lower-lower case values, numeric and non- non-numeric values). You are responsible for credentials and must keep credentials secure and confidential. 5.4.3 6.6. Rogers will track all access to your Services through the IP Portal online ticketing system and will ensure that they have all your necessary documented approvals from you prior to accessing or changing your Services. When the situation is considered a security breach or could have serious consequences, Rogers will notify you and will act on your behalf if Rogers is unable to get correct approvals in a timely manner to deal with the threat. 5.4.4 In the event of any emergency that presents a substantial risk of a service outage, or damage to Rogers Equipment or data belonging to Rogers, a third party, data center facilities, or to any persons or property present therein, Rogers shall take all reasonable measures to respond to the emergency; and only as necessary, Rogers may disable Managed Firewall Services if the emergency requires such action to avoid damage. 5.4.5 6.7. You agree to co-operate and assist Rogers with any investigation or action taken in relation to Rogers’ operations and provisioning of Servicesservices, confirmation of Your your compliance with the Agreement and, or breach of the Agreement by you. 5.4.6 You are not permitted 6.8. In the event of any emergency that presents a substantial risk of an Out of Service condition, or damage to run security penetration tests on Customer Equipment or data belonging to Rogers, a third party, the Managed Firewall Services without written approval from Colocated Site, or to any persons or property present therein, Rogers may rearrange the Customer Equipment as is reasonably necessary to respond to the emergency. Additionally, and any only as necessary, Rogers may disconnect Customer Equipment if the emergency requires such actions will be considered improper use under the Agreementdisconnection to avoid damage. Rogers mayshall use commercially reasonable efforts to notify you prior to rearranging the Customer Equipment or disconnecting the Customer Equipment, without liability, restrict Managed Firewall Services platform access if and in any case will notify you perform invasive platform testing without written approvalthereafter.

Appears in 1 contract

Samples: Data Centre and Cloud Services Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!