Service Integrity and Availability Sample Clauses

Service Integrity and Availability. Modifications to operating systems and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are reviewed by the IBM security staff before implementation. IBM monitors the data center 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are used in all IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport.
AutoNDA by SimpleDocs
Service Integrity and Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process. IBM systematically monitors the data center resources 24x7. Internal and external vulnerability scanning has been conducted by authorized administrators to help detect and resolve potential system security exposures; such scans may be less frequent and require third party consent if the client has opted for a non-IBM data center provider. HTTPS encrypted communications channels are available for user access to data at the client’s discretion. All IBM access to client data is encrypted. Security configuration and patch management activities are performed and reviewed.
Service Integrity and Availability. Modifications to operating systems and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are reviewed by the IBM security staff before implementation. IBM’s data center is monitored 24x7. Internal and external vulnerability scanning is regularly conducted by IBM security personnel and third party vendors to help detect and resolve potential system security exposures. Security (antivirus, intrusion detection, and intrusion prevention) systems are implemented within the production infrastructure. The IBM Silverpop platform’s production infrastructure is co-located in Tier 3 or higher data centers that provide physical-security and environmental controls that meet or exceed industry standards, as evidenced in the providers annual SSAE-16 SOC 1 Type II attestation report. Backup data is written directly to disk in a secondary data center or encrypted prior to transport to external storage.
Service Integrity and Availability. Modifications to operating systems and application software are governed by IBM’s change management process. IBM monitors the data center 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to- site VPN. Backup data intended for off-site storage is encrypted prior to transport.
Service Integrity and Availability. Modifications to operating system resources (OSRs) and application software are governed by IBM’s change management process. Changes to firewall rules are governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM data center resources are monitored 24x7 by IBM staff. Vulnerability scanning is regularly conducted by authorized administrators to help detect and resolve potential system security exposures. Malware detection (antivirus, vulnerability scanning, and intrusion prevention) systems are in place throughout IBM data centers.
Service Integrity and Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM data center resources are monitored and maintained 24x7 by IBM staff. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport. IBM data center resources also include redundant and back-up power supplies. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures including ingress and egress filtering on core routers to guard against address spoofing; use of private IP address space to shield core infrastructure components from the Internet system patching procedures; use of virtual IP addresses to mask hosts; and use of load balancers to buffer connection requests. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are in place throughout all IBM data centers.

Related to Service Integrity and Availability

  • Service Availability You understand that Service availability is at all times conditioned upon the corresponding operation and availability of the communication systems used in communicating your instructions and requests to the Credit Union. We will not be liable or have any responsibility of any kind for any loss or damage thereby incurred by you in the event of any failure or interruption of such communication systems or services resulting from the act or omission of any third party, or from any other cause not reasonably within the control of the Credit Union.

  • DNS name server availability Refers to the ability of a public-­‐DNS registered “IP address” of a particular name server listed as authoritative for a domain name, to answer DNS queries from an Internet user. All the public DNS-­‐registered “IP address” of all name servers of the domain name being monitored shall be tested individually. If 51% or more of the DNS testing probes get undefined/unanswered results from “DNS tests” to a name server “IP address” during a given time, the name server “IP address” will be considered unavailable.

  • Records Availability and Retention Records of Contractor’s costs, reimbursable expenses pertaining to the Project and payments shall be available to Owner or its authorized representative during business hours and shall be retained for four (4) years after final Payment or abandonment of the Project, unless Owner otherwise instructs Contractor in writing.

  • EPP service availability Refers to the ability of the TLD EPP servers as a group, to respond to commands from the Registry accredited Registrars, who already have credentials to the servers. The response shall include appropriate data from the Registry System. An EPP command with “EPP command RTT” 5 times higher than the corresponding SLR will be considered as unanswered. If 51% or more of the EPP testing probes see the EPP service as unavailable during a given time, the EPP service will be considered unavailable.

  • Therapist Availability Therapist’s office is equipped with a confidential voice mail system that allows Patient to leave a message at any time. Therapist will make every effort to return calls within 24 hours (or by the next business day), but cannot guarantee the calls will be returned immediately. Therapist is unable to provide 24-hour crisis service. In the event that Patient is feeling unsafe or requires immediate medical or psychiatric assistance, he/she should call 911, or go to the nearest emergency room.

  • General Availability The commitment to availability specified in the letter of appointment shall be subject to mutually acceptable revision. Such revision will occur once per year, or, if mutually agreed between the Employer and the employee, on a more frequent basis. The Employer will issue a revised letter of appointment to reflect approved changes to employee’s general availability.

  • System Availability System Availability percentage is calculated as follows:  Total MinutesintheMonth −Downtime   System Availability%age =  Total MinutesintheMonth *100    System Availability SLA (“SLA”) 99.5% System Availability percentage during each Month for productive versions Credit 2% of Monthly Subscription Fees for each 1% below SLA, not to exceed 100% of Monthly Subscription Fees Excluded Downtime Total Minutes in the Month attributable to: (i) a Scheduled Downtime for which a Regular Maintenance Window is described in Section 4 below, or (ii) any other Scheduled Downtime according to Section 4 for which the customer has been notified at least five (5) business days prior to such Scheduled Downtime or (iii) unavailability caused by factors outside of SAP’s reasonable control, such as unpredictable and unforeseeable events that could not have been avoided even if reasonable care had been exercised. Scheduled Downtime Scheduled Downtime for the applicable Cloud Services to which customer has subscribed is set forth in Section 4 below entitled “Maintenance Windows for Cloud Services”.

  • DNS service availability Refers to the ability of the group of listed-­‐as-­‐authoritative name servers of a particular domain name (e.g., a TLD), to answer DNS queries from DNS probes. For the service to be considered available at a particular moment, at least, two of the delegated name servers registered in the DNS must have successful results from “DNS tests” to each of their public-­‐DNS registered “IP addresses” to which the name server resolves. If 51% or more of the DNS testing probes see the service as unavailable during a given time, the DNS service will be considered unavailable.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • High Availability Registry Operator will conduct its operations using network and geographically diverse, redundant servers (including network-­‐level redundancy, end-­‐node level redundancy and the implementation of a load balancing scheme where applicable) to ensure continued operation in the case of technical failure (widespread or local), or an extraordinary occurrence or circumstance beyond the control of the Registry Operator. Registry Operator’s emergency operations department shall be available at all times to respond to extraordinary occurrences.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!