Common use of Security Technology Clause in Contracts

Security Technology. When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption, at rest and in transit. The service shall prevent and detect computer viruses and malware from spreading through the use of the service, e.g. via e-mail, files, documents, messages, other data or the required use of insecure LEA- side applications. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

Appears in 45 contracts

Samples: Rhode Island Student Data Privacy Agreement, Rhode Island, Rhode Island

AutoNDA by SimpleDocs

Security Technology. When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption, at rest and in transit. The service shall take commercially reasonable measures to prevent and detect computer viruses and malware from spreading through the use of the service, e.g. via e-mail, files, documents, messages, other data or the required use of insecure LEA- side applications. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

Appears in 1 contract

Samples: sdpc.a4l.org

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.