Security Segmentation Sample Clauses

Security Segmentation. Talos will use appropriate measures to monitor, detect and restrict the flow of information on a multilayered basis within the Talos Systems using tools such as firewalls, proxies, and network-based intrusion detection systems, where necessary.
AutoNDA by SimpleDocs
Security Segmentation. (a) Ntrepid will undertake reasonable measures to monitor, detect and restrict the flow of Customer Confidential Information on a multi-layered basis in Ntrepid Systems by using tools that include, but are not limited to, firewalls, proxies, and network-based intrusion detection systems.
Security Segmentation. Company will use reasonable measures to monitor, detect and restrict the flow of information on a multi-layered basis within the Company Systems using tools such as firewalls, proxies, and network-based intrusion detection systems.
Security Segmentation. Each Party will implement reasonable measures designed to monitor, detect and restrict the flow of information on a multi-layered basis within its network systems using tools such as isolation layers, proxies, sandboxes, and network-based intrusion detection systems.
Security Segmentation. Sentropy will use reasonable measures designed to monitor, detect and restrict the flow of information on a multilayered basis using tools such as firewalls, proxies, and network-based intrusion detection systems.
Security Segmentation. Provider will monitor, detect and restrict the flow of information on a multilayered basis using tools such as firewalls, proxies, and network-based intrusion detection systems.

Related to Security Segmentation

  • Segmentation The purchase of any Products and related Service Offerings or other Service Offerings are all separate offers and separate from any other order for any Products and related Service Offerings or other Service Offerings You may receive or have received from Oracle. You understand that You may purchase any Products and related Service Offerings or other Service Offerings independently of any other Products or Service Offerings. Your obligation to pay for (a) any Products and related Service Offerings is not contingent on performance of any other Service Offerings or delivery of any other Products or (b) other Service Offerings is not contingent on delivery of any Products or performance of any additional/other Service Offerings. You acknowledge that You have entered into the purchase without reliance on any financing or leasing arrangement with Oracle or its affiliate.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Implementation Services The Company and the Client have developed a plan for implementing the services to be provided hereunder, including with respect to the transition of responsibility for such services from the Client and its current administrator to the Company, which plan attached hereto as Schedule I (the “Implementation Plan”). The Company shall perform the services required to complete the Implementation Plan, as set forth therein (the “Implementation Services”). The Company and the Client shall comply with any applicable requirements agreed in the Implementation Plan.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

Time is Money Join Law Insider Premium to draft better contracts faster.