System Hardening Sample Clauses

System Hardening i) Jamf will establish and ensure the use of standard secure configurations of operating systems. Images should represent hardened versions of the underlying operating system and the applications installed on the system. Hardening includes removal of unnecessary accounts (including service accounts), disabling or removal of unnecessary services, applying patches, closing open and unused network ports, and implementing intrusion detection systems and/or intrusion prevention systems. These images should be validated on a regular basis to update their security configuration as appropriate. ii) Jamf will perform periodic (at least quarterly) access reviews for system administrators for all supporting systems requiring access control. iii) Jamf will implement patching tools and processes for both applications and operating system software. When outdated systems can no longer be patched, Jamf will update to the latest version of application software. Jamf will remove outdated, unsupported, and unused software from the system. iv) Jamf will limit administrative privileges to only those personnel who have both the knowledge necessary to administer the operating system and a business need to modify the configuration of the underlying operating system.
AutoNDA by SimpleDocs
System Hardening. Information-processing equipment is protected against malware and hardened. Suitable software (e.g., virus scanners, IDS) are installed and kept up-to-date to protect the systems. When hardening a system, the following points must be taken into account at the minimum: • The patch level is up-to-date. • When a system is installed, only those software components are installed or activated that are required for the system’s operation and proper functioning. • Apart from software functions, any hardware functions that are not required for the system’s operation also remain deactivated after the system installation. Functions such as interfaces that are not required are permanently deactivated, ensuring that they remain deactivated even when the system is restarted. • All unnecessary services in a system and in the interfaces were and remain deactivated even when the system is restarted. • The accessibility of a service via the necessary interfaces was also restricted to legitimate communication partners. • Preconfigured service accounts that are not required were deleted and default passwords were changed. • It is common practice for manufacturers, developers, or suppliers to preconfigure authentication features such as passwords and cryptographic keys in systems. Such authentication features were changed to separate features that third parties are not aware of. • If the system is operated on a cloud platform, it has been safeguarded to prevent it (or the entire client/tenant with all of its services and data) from being deleted accidentally or by unauthorized persons.
System Hardening. Third Party shall use Internet-industry standard system and device hardening standards for all Systems that store, process, or transmit SAP Data. Such hardening standards will include: a. Disable or remove all unnecessary services. b. Security patch management is implemented to provide regular and periodic deployment of relevant security updates. c. Change all default passwords. d. Rename administrative user accounts. e. Each server performs only one function (e.g., web server, application server, and database server should occupy separate systems). f. Employ host-based intrusion detection and prevention mechanism. g. Passwords are stored using industry accepted hashing algorithm; only administrators that support the function have access to stored hashes, when necessary.
System Hardening. 4.1. All Service Providers are to conduct build hardening for all devices. 4.2. Hardening standards should be reviewed quarterly or following a significant and relevant vulnerability announcement. Additional ad-hoc reviews may be required as part of post- Incident activities.
System Hardening. System hardening procedures to disable all unnecessary services on devices and servers used to access, process, transmit or store Covered Information of the other Party or devices and systems that reside on the same restricted network segment. Unnecessary services include any service not required to meet business needs.
System Hardening 

Related to System Hardening

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Cheating Cheating is prohibited, and will result in immediate action and termination without compensation.

  • System Upgrades The Connecting Transmission Owner shall procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement. To the extent that design work is necessary in addition to that already accomplished in the Class Year Interconnection Facilities Study for the Interconnection Customer, the Connecting Transmission Owner shall perform or cause to be performed such work. If all the Parties agree, the Interconnection Customer may construct System Upgrade Facilities and System Deliverability Upgrades. 5.2.1 As described in Section 32.3.5.3 of the SGIP in Attachment Z of the ISO OATT, the responsibility of the Interconnection Customer for the cost of the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement shall be determined in accordance with Attachment S of the ISO OATT, as required by Section 32.3.5.3.2

  • System Maintenance The Trust understands that USBFS will perform periodic maintenance to the System(s), which may cause temporary service interruptions. To the extent possible, USBFS shall notify the Trust of all planned outages and will perform any necessary maintenance during non-business hours.

  • Landscaping 3.9.1 All plant material shall conform to the Canadian Nursery Landscape Association’s Canadian Nursery Stock Standard (ninth edition or newer). 3.9.2 There shall be an opaque wood fence or masonry wall at least 1.8 metres tall along the eastern property line extending the length of the surface parking area and access to the underground parking area as generally shown on Schedule B. 3.9.3 Prior to the issuance of a Development Permit, the Developer agrees to provide Landscape Plan that comply with the provisions of this section. The Landscape Plan shall be prepared by a Landscape Architect (a full member, in good standing with Canadian Society of Landscape Architects) and comply with all provisions of this section. 3.9.4 Prior to issuance of the first Occupancy Permit the Developer shall submit to the Development Officer a letter prepared by a member in good standing of the Canadian Society of Landscape Architects certifying that all landscaping has been completed according to the terms of this Development Agreement. 3.9.5 Notwithstanding Section 3.9.4, where the weather and time of year do not allow the completion of the outstanding landscape works prior to the issuance of the Occupancy Permit, the Developer may supply a security deposit in the amount of 110 percent of the estimated cost to complete the landscaping. The cost estimate is to be prepared by a member in good standing of the Canadian Society of Landscape Architects. The security shall be in favour of the Municipality and shall be in the form of a certified cheque or automatically renewing, irrevocable letter of credit issued by a chartered bank. The security shall be returned to the Developer only upon completion of the work as described herein and illustrated on the Schedules, and as approved by the Development Officer. Should the Developer not complete the landscaping within twelve months of issuance of the Occupancy Permit, the Municipality may use the deposit to complete the landscaping as set out in this section of the Agreement. The Developer shall be responsible for all costs in this regard exceeding the deposit. The security deposit or unused portion of the security deposit shall be returned to the Developer upon completion of the work and its certification. 3.9.6 All landscape areas designed to be installed upon any portion of the building must be supported by documentation from a Structural Engineer indicating that the building design is able to support any required drainage or additional weight caused by the landscaped area.

  • Sprinkler System If there now is or shall be installed in said building a "sprinkler system" the Tenant agrees to keep the appliances thereto in the demised premises in repair and good working condition, and if the New York Board of Fire Underwriters or the New York Fire Insurance Exchange or any bureau, department or official of the State or local government requires or recommends that any changes, modifications, alterations or additional sprinkler heads or other equipment be made or supplied by reason of the Tenant's business, or the location of partitions, trade fixtures, or other contents of the demised premises, or if such changes, modifications, alterations, additional sprinkler heads or other equipment in the demised premises are necessary to prevent the imposition of a penalty or charge against the full allowance for a sprinkler system in the fire insurance rate as fixed by said Exchange or by any fire insurance company, the Tenant will at the Tenant's own expense, promptly make and supply such changes, modifications, alterations, additional sprinkler head or other equipment. As additional rent hereunder the Tenant will pay to the Landlord, annually in advance, throughout the term 100%, toward the contract price for sprinkler supervisory service.

  • NON-SMOKING UNIT ENTRY BY OWNER

  • - Overtime Premium and No Pyramiding Subject to any superior conditions, the overtime rate shall be time and one-half (1-1/2) the employee's straight-time hourly rate. Where an employee is required to work additional overtime contiguous to an overtime shift within a twenty-four (24) hour period, the employee will be compensated at the rate of double time his or her straight time hourly rate for all additional contiguous overtime hours worked. Overtime premium will not be duplicated nor pyramided nor shall other premiums be duplicated nor pyramided nor shall the same hours worked be counted as part of the normal work week and also as hours for which the overtime premium is paid.

  • Heating The Hirer shall ensure that no unauthorised heating appliances shall be used on the premises when open to the public without the consent of the management committee. Portable Liquefied Propane Gas (LPG) heating appliances shall not be used.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!