Common use of Virtualized System Clause in Contracts

Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,to identify sources of a potential attack/intrusion at the network perimeter. • Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. • Any single image of data classified as Confidential defines the minimum-security requirement for all virtual instances on the same host system. • Virtualized systems may contain data classified as Confidential Information. (c) Applications thatrequire physical separation cannot be on the same host system.

Appears in 2 contracts

Samples: Processing and Security Agreement, Processing and Security Agreement

AutoNDA by SimpleDocs

Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,, to identify sources of a potential attack/intrusion at the network perimeter. Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. Any single image of data classified as Confidential defines the minimum-minimum security requirement for all virtual instances on the same host system. Virtualized systems may contain data classified as Confidential Informationconfidential data. (c) Applications thatrequire that require physical separation cannot be on the same host system.

Appears in 1 contract

Samples: Enterprise Supplier

AutoNDA by SimpleDocs

Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,, to identify sources of a potential attack/intrusion at the network perimeter. Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. Any single image of data classified as Confidential defines the minimum-minimum security requirement for all virtual instances on the same host system. Virtualized systems may contain data classified as Confidential Informationconfidential data. (c) Applications thatrequire that require physical separation cannot be on the same host system.

Appears in 1 contract

Samples: Enterprise Supplier

Time is Money Join Law Insider Premium to draft better contracts faster.