Common use of Virtualized System Clause in Contracts

Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,to identify sources of a potential attack/intrusion at the network perimeter. • Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. • Any single image of data classified as Confidential defines the minimum-security requirement for all virtual instances on the same host system. • Virtualized systems may contain data classified as Confidential Information. (c) Applications thatrequire physical separation cannot be on the same host system.

Appears in 2 contracts

Samples: Data Processing and Security Agreement, Data Processing and Security Agreement

AutoNDA by SimpleDocs

Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,, to identify sources of a potential attack/intrusion at the network perimeter. Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. Any single image of data classified as Confidential defines the minimum-minimum security requirement for all virtual instances on the same host system. Virtualized systems may contain data classified as Confidential Informationconfidential data. (c) Applications thatrequire that require physical separation cannot be on the same host system.

Appears in 1 contract

Samples: Data Processing and Security Agreement

AutoNDA by SimpleDocs

Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,, to identify sources of a potential attack/intrusion at the network perimeter. Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. Any single image of data classified as Confidential defines the minimum-minimum security requirement for all virtual instances on the same host system. Virtualized systems may contain data classified as Confidential Informationconfidential data. (c) Applications thatrequire that require physical separation cannot be on the same host system.

Appears in 1 contract

Samples: Data Processing and Security Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!