Common use of System and Communications Protection Clause in Contracts

System and Communications Protection. Supplier will: a. Encrypt (in Transit and at Rest) Verizon Highly Confidential information. b. Employ reasonable controls to secure source code, including version control, segregation of source code repositories, and least privilege access principles. c. Incorporate security vulnerability and malicious code assessments throughout the software development life cycle. d. Ensure the information system separates user functionality (including user interface services) from information system management functionality. e. Implement denial of service (DoS) detection and mitigation controls. f. Monitor and control communications at the external boundary of the system and at key internal boundaries within the system. g. Implement subnetworks for publicly accessible system components that are either physically or logically separated from internal, trusted Supplier networks. EA-7

Appears in 4 contracts

Samples: Transfer and Servicing Agreement (Verizon Master Trust), Transfer and Servicing Agreement (Verizon Master Trust), Transfer and Servicing Agreement (Verizon Master Trust)

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.