System and Information Integrity. Supplier must: a. Identify, report, update, and correct information and information system vulnerabilities in a timely manner, as required by Section 11. b. Provide protection from malicious code (e.g., viruses or malware) at appropriate locations within information systems. c. Monitor information system security alerts and advisories and take appropriate actions in response. d. Implement appropriate controls to ensure Verizon Confidential Information is used only for permitted business purposes authorized under the Agreement, and not for Supplier's own or other purposes. e. Monitor the information system to detect attacks and indicators of potential attacks in accordance with Supplier monitoring objectives. f. Implements security safeguards to protect information system memory from unauthorized code execution.
Appears in 4 contracts
Samples: Transfer and Servicing Agreement (Verizon Owner Trust 2020-C), Transfer and Servicing Agreement (Verizon Owner Trust 2020-C), Transfer and Servicing Agreement (Verizon Owner Trust 2020-B)