Service Integrity and Availability Clause Samples

Service Integrity and Availability. Modifications to operating systems and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are reviewed by the IBM security staff before implementation. IBM monitors the data center 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are used in all IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport.
Service Integrity and Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process. IBM systematically monitors the data center resources 24x7. Internal and external vulnerability scanning has been conducted by authorized administrators to help detect and resolve potential system security exposures; such scans may be less frequent and require third party consent if the client has opted for a non-IBM data center provider. HTTPS encrypted communications channels are available for user access to data at the client’s discretion. All IBM access to client data is encrypted. Security configuration and patch management activities are performed and reviewed.
Service Integrity and Availability. Modifications to operating system resources (OSRs) and application software are governed by IBM’s change management process. Changes to firewall rules are governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM data center resources are monitored 24x7 by IBM staff. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are in place throughout IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport.
Service Integrity and Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM data center resources are monitored and maintained 24x7 by IBM staff. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport. IBM data center resources also include redundant and back-up power supplies. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures including ingress and egress filtering on core routers to guard against address spoofing; use of private IP address space to shield core infrastructure components from the Internet system patching procedures; use of virtual IP addresses to mask hosts; and use of load balancers to buffer connection requests. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are in place throughout all IBM data centers.
Service Integrity and Availability. Modifications to operating systems and application software are governed by IBM’s change management process. IBM monitors the data center 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to- site VPN. Backup data intended for off-site storage is encrypted prior to transport.
Service Integrity and Availability. Modifications to operating systems and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are reviewed by the IBM security staff before implementation. IBM’s data center is monitored 24x7. Internal and external vulnerability scanning is regularly conducted by IBM security personnel and third party vendors to help detect and resolve potential system security exposures. Security (antivirus, intrusion detection, and intrusion prevention) systems are implemented within the production infrastructure. The IBM Silverpop platform’s production infrastructure is co-located in Tier 3 or higher data centers that provide physical-security and environmental controls that meet or exceed industry standards, as evidenced in the providers annual SSAE-16 SOC 1 Type II attestation report. Backup data is written directly to disk in a secondary data center or encrypted prior to transport to external storage.
Service Integrity and Availability. Modifications to operating system resources (OSRs) and application software are governed by IBM’s change management process. Changes to firewall rules are governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM data center resources are monitored 24x7 by IBM staff. Vulnerability scanning is regularly conducted by authorized administrators to help detect and resolve potential system security exposures. Malware detection (antivirus, vulnerability scanning, and intrusion prevention) systems are in place throughout IBM data centers.