Security Infrastructure Sample Clauses

Security Infrastructure.  Provider shall be in charge of acquisition, installation and operation of security solution as well as equipment so that the Client’s service could be provided in a stable manner. ‚ Provider shall be in charge of security review and abusing response and also respond to the security breaches.
AutoNDA by SimpleDocs
Security Infrastructure. 3.4.3.1 Security applies to all aspects of the BEAP design and operation, from the policies and procedures of the people working with the BEAP, right through to the physical security of the data centre(s) that host the BEAP.
Security Infrastructure. Each facility is protected by a “defense-in-depth” security architecture consisting of firewalls, IDS (Intrusion Detection Systems), anti-virus/anti-malware protection, monitoring capabilities, and DDoS protection monitoring and mitigation.
Security Infrastructure. Rhaegal do not store but only processes data on your behalf. We understand the nature of our role as a Data Processor and take appropriate measures to protect any unauthorized use or access. Our Security Infrastructure includes Intrusion detection services, security monitoring, Restricted Physical Access, Restricted Network Access, Encrypted Data Access, Redundant firewalls, Isolated public/private LANs, Isolated NAS and SAN access, and Real-time anti-virus. In addition, only restricted individuals and workstations may update critical elements of the system such as Firewall rules, Settings, recovery procedures, and backup procedures. System monitors and logs all major components including application services, system settings, load balancers, firewalls and LAN traffic. Any security inquiries can be addressed at xxxxxxxx@xxxxxxx.xxx.
Security Infrastructure. The following infrastructure and security is provided at the Company’s data centres in the United Kingdom with 1 and 1
Security Infrastructure. The security infrastructure associated with the AP1000 Plant includes the security system (SES) for the design and hardware inside the Standard Plant and the access portals, equipment and barriers to control access to the Protected Area. The Protected Area access and barriers will be designed and constructed to include: · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] A detailed description of the Site security infrastructure will be provided in Phase 1.
Security Infrastructure. The security infrastructure associated with the AP1000 Plant includes the security system (SES) for the design and hardware inside the Standard Plant and the access portals, equipment and barriers to control access to the Protected Area. The Protected Area access and barriers will be designed and constructed to include: • Barriers to vehicle access including big rocks and pop-up road barrier • Fencing • Gravel base between fencing • Lighting • Communications • Access control system • Intruder detection systems including cameras and infrared sensing systems • Security building at main access portal • Vehicle access portal • Main road security post • Search area equipment • Security power system A detailed description of the Site security infrastructure will be provided in Phase 1.
AutoNDA by SimpleDocs
Security Infrastructure. To ensure that an adequate level of information security is achieved and maintained, a security structure has been developed to support the information systems. The security structure includes senior business managers who are responsible for ensuring that a level of information security is achieved which is commensurate with both the business need to provide the system, and the overall threat to the information systems. Key appointments in the security infrastructure that support the information systems are:
Security Infrastructure eArcu shall ensure that the Software Service and the Customer Data is protected by state-full inspection firewalls, anti-malware software, and intruder detection technology.

Related to Security Infrastructure

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins. (2) Maintain waterbars, drainage dips, and other water diversion measures. (3) During active use, patrol and maintain functional drainage. (4) Repair damaged culvert ends.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!