Common use of Service Integrity & Availability Clause in Contracts

Service Integrity & Availability. Modifications to operating system resources (OSRs) and application software are governed by IBM’s change management process. Hardware, software, access logs, read only access and encryption controls are used within the network infrastructure and on the workstations of individuals working in IBM data centers or with client data in IBM’s data centers to help lessen the likelihood of the propagation and execution of computer viruses and other forms of known harmful code. IBM uses over-the-network encryption via standard SSL (https) connections and the IBM infrastructure employs technology solutions for end-to-end security, including firewall, intrusion prevention, and anti-malware technologies. Transmission Control Protocols/Internet Protocols (TCP/IP) vulnerability scanning is periodically conducted by authorized administrators to detect and resolve potential system security exposures. IBM warehouse data is copied to secondary storage in the IBM data center, and tertiary archival (tape) is encrypted and duplicated for storage at a 3rd party offsite disaster recovery facility.

Appears in 7 contracts

Samples: Services Agreement, Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

AutoNDA by SimpleDocs

Service Integrity & Availability. Modifications to operating system resources (OSRsOSR) and application software are governed by IBM’s change management process. Hardware, software, access logs, read only access and encryption controls are used within the network infrastructure and on the workstations of individuals working in IBM IBM’s data centers or with client data in IBM’s data centers to help lessen the likelihood of the propagation and execution of computer viruses and other forms of known harmful code. IBM uses over-the-network encryption via standard SSL (https) connections and the IBM infrastructure employs technology solutions for end-to-end security, including firewall, intrusion prevention, and anti-malware technologies. Transmission Control Protocols/Internet Protocols (TCP/IP) vulnerability scanning is periodically conducted by authorized administrators to detect and resolve potential system security exposures. IBM warehouse data is copied to secondary storage in the IBM data center, and tertiary archival (tape) is encrypted and duplicated for storage at a 3rd party offsite disaster recovery facility.

Appears in 2 contracts

Samples: Services Agreement, Services Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!