Service Integrity and Availability Sample Clauses

Service Integrity and Availability. Modifications to operating systems and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are reviewed by the IBM security staff before implementation. IBM monitors the data center 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are used in all IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport.
AutoNDA by SimpleDocs
Service Integrity and Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process. IBM systematically monitors the data center resources 24x7. Internal and external vulnerability scanning has been conducted by authorized administrators to help detect and resolve potential system security exposures; such scans may be less frequent and require third party consent if the client has opted for a non-IBM data center provider. HTTPS encrypted communications channels are available for user access to data at the client’s discretion. All IBM access to client data is encrypted. Security configuration and patch management activities are performed and reviewed.
Service Integrity and Availability. Modifications to operating system resources (OSRs) and application software are governed by IBM’s change management process. Changes to firewall rules are governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM data center resources are monitored 24x7 by IBM staff. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are in place throughout IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport.
Service Integrity and Availability. Modifications to operating system resources (OSRs) and application software are governed by IBM’s change management process. Changes to firewall rules are governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM data center resources are monitored 24x7 by IBM staff. Vulnerability scanning is regularly conducted by authorized administrators to help detect and resolve potential system security exposures. Malware detection (antivirus, vulnerability scanning, and intrusion prevention) systems are in place throughout IBM data centers.
Service Integrity and Availability. Modifications to operating systems and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are reviewed by the IBM security staff before implementation. IBM’s data center is monitored 24x7. Internal and external vulnerability scanning is regularly conducted by IBM security personnel and third party vendors to help detect and resolve potential system security exposures. Security (antivirus, intrusion detection, and intrusion prevention) systems are implemented within the production infrastructure. The IBM Silverpop platform’s production infrastructure is co-located in Tier 3 or higher data centers that provide physical-security and environmental controls that meet or exceed industry standards, as evidenced in the providers annual SSAE-16 SOC 1 Type II attestation report. Backup data is written directly to disk in a secondary data center or encrypted prior to transport to external storage.
Service Integrity and Availability. Modifications to operating systems and application software are governed by IBM’s change management process. IBM monitors the data center 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to- site VPN. Backup data intended for off-site storage is encrypted prior to transport.
Service Integrity and Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM data center resources are monitored and maintained 24x7 by IBM staff. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport. IBM data center resources also include redundant and back-up power supplies. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures including ingress and egress filtering on core routers to guard against address spoofing; use of private IP address space to shield core infrastructure components from the Internet system patching procedures; use of virtual IP addresses to mask hosts; and use of load balancers to buffer connection requests. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are in place throughout all IBM data centers.
AutoNDA by SimpleDocs

Related to Service Integrity and Availability

  • Service Availability You understand that Service availability is at all times conditioned upon the corresponding operation and availability of the communication systems used in communicating your instructions and requests to the Credit Union. We will not be liable or have any responsibility of any kind for any loss or damage thereby incurred by you in the event of any failure or interruption of such communication systems or services resulting from the act or omission of any third party, or from any other cause not reasonably within the control of the Credit Union.

  • DNS name server availability Refers to the ability of a public-­‐DNS registered “IP address” of a particular name server listed as authoritative for a domain name, to answer DNS queries from an Internet user. All the public DNS-­‐registered “IP address” of all name servers of the domain name being monitored shall be tested individually. If 51% or more of the DNS testing probes get undefined/unanswered results from “DNS tests” to a name server “IP address” during a given time, the name server “IP address” will be considered unavailable.

  • EPP service availability Refers to the ability of the TLD EPP servers as a group, to respond to commands from the Registry accredited Registrars, who already have credentials to the servers. The response shall include appropriate data from the Registry System. An EPP command with “EPP command RTT” 5 times higher than the corresponding SLR will be considered as unanswered. If 51% or more of the EPP testing probes see the EPP service as unavailable during a given time, the EPP service will be considered unavailable.

  • General Availability The commitment to availability specified in the letter of appointment shall be subject to mutually acceptable revision. Such revision will occur once per year, or, if mutually agreed between the Employer and the employee, on a more frequent basis. The Employer will issue a revised letter of appointment to reflect approved changes to employee’s general availability.

  • System Availability Although we will try to provide continuous access to the Service, we cannot and do not guarantee that the Service will be available 100% of the time and will not be liable in the event Service is unavailable. Actual service or network performance is dependent on a variety of factors outside of our control. If you notify us within twenty-four (24) hours and we confirm an outage consisting of a period of two (2) hours in any calendar month, and not due to any service, act, or omission of you, a third party, your applications, equipment or facilities, or reasons outside of our control, you shall be eligible for a service credit. A service credit shall be computed as a pro-rated charge for one day of the regular monthly fees for the Service in the next monthly statement. Intermittent service outages for periods of less than two (2) hours are not considered service outages. Outages caused by routine scheduled maintenance are also not considered an outage. You shall receive advance notice no less than forty-eight (48) hours in advance of our scheduled maintenance. Scheduled maintenance will be performed between 12:00 a.m. and 6:00 a.m. CST.

  • DNS service availability Refers to the ability of the group of listed-­‐as-­‐authoritative name servers of a particular domain name (e.g., a TLD), to answer DNS queries from DNS probes. For the service to be considered available at a particular moment, at least, two of the delegated name servers registered in the DNS must have successful results from “DNS tests” to each of their public-­‐DNS registered “IP addresses” to which the name server resolves. If 51% or more of the DNS testing probes see the service as unavailable during a given time, the DNS service will be considered unavailable.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • High Availability Registry Operator will conduct its operations using network and geographically diverse, redundant servers (including network-­‐level redundancy, end-­‐node level redundancy and the implementation of a load balancing scheme where applicable) to ensure continued operation in the case of technical failure (widespread or local), or an extraordinary occurrence or circumstance beyond the control of the Registry Operator. Registry Operator’s emergency operations department shall be available at all times to respond to extraordinary occurrences.

  • Product Availability Under no circumstances shall Company be responsible to Representative or anyone else for its failure to fill accepted orders, or for its delay in filling accepted orders, when such failure or delay is due to strike, accident, labor trouble, acts of nature, freight embargo, war, civil disturbance, vendor problems or any cause beyond Company's reasonable control.

  • Unavailability of Tenor of Benchmark Notwithstanding anything to the contrary herein or in any other Loan Document, at any time (including in connection with the implementation of a Benchmark Replacement), (i) if the then-current Benchmark is a term rate (including the Term SOFR Reference Rate) and either (A) any tenor for such Benchmark is not displayed on a screen or other information service that publishes such rate from time to time as selected by the Administrative Agent in its reasonable discretion or (B) the regulatory supervisor for the administrator of such Xxxxxxxxx has provided a public statement or publication of information announcing that any tenor for such Benchmark is not or will not be representative, then the Administrative Agent may modify the definition of “Interest Period” (or any similar or analogous definition) for any Benchmark settings at or after such time to remove such unavailable or non-representative tenor and (ii) if a tenor that was removed pursuant to clause (i) above either (A) is subsequently displayed on a screen or information service for a Benchmark (including a Benchmark Replacement) or (B) is not, or is no longer, subject to an announcement that it is not or will not be representative for a Benchmark (including a Benchmark Replacement), then the Administrative Agent may modify the definition of “Interest Period” (or any similar or analogous definition) for all Benchmark settings at or after such time to reinstate such previously removed tenor.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!