Customer Security Policy definition

Customer Security Policy or “CSP” means the rules that are set and owned by you, that dictate the operation of the Service.
Customer Security Policy means a Customer’s security policy and procedures in force from time to time, including any specific security requirements set out in the Call Off Agreement;
Customer Security Policy or “CSP” means your security policy containing the security rules, set and owned by you, that are applied to the BT CrowdStrike Service and determine the operation of the BT CrowdStrike Service. “Change Management Process” means the simple service request service as set out in Paragraph 2.14 of the Schedule.

Examples of Customer Security Policy in a sentence

  • HP-OMS will provide Firewall and VPN Services according to the Customer Security Policy that will be defined by the customer.

  • HP-OMS will provide Full Support for content protection of the Customer with proactive, multi-tiered Internet Content Security for gateway and mail servers, protecting the entire IT Environment from: o Viruses, Trojans, worms, blended threats, and other malicious code that destroys or steals digital assets o Security exploits in corporate email servers and email clients HP-OMS will provide content protection Services according to the Customer Security Policy that will be defined by the customer.

  • The Web Filtering (or Web Filter) feature controls access to Web services through a configurable URL filtering policy under the Customer Security Policy.

  • Customer may choose to send all files or only certain suspicious files for scanning, per the Customer Security Policy.

  • SPEAR Customer Security Policy means this policy as set out in Schedule 1 of the Common Rules, as amended from time to time.

  • Time to Change (TTC) measures the period of time during which Orange carries out change requests received from Customer for changes to the Customer Security Policy or configuration of the FSP Service.

  • The Security Password & Security Questions that are part of this new Customer Security Policy will be used when you contact MTCO by phone/Chat/email, or visit the office.

  • CPE software and hardware leveling may be required, as described in Clause 1.1.6(c) (Leveling Requirements and Customer Security Policy Request).

  • It is well known and easy to check that each of the three sum-orders above has these properties.

  • It allows Customer to create secure areas which can be connected to Customer networks and resources, accessible according to Customer Security Policy.


More Definitions of Customer Security Policy

Customer Security Policy or “CSP” means your security policy containing the security rules, set and owned by you, that are applied to the BT CrowdStrike Service and determine the operation of the BT CrowdStrike Service. “De-installation Charges” means the charges payable by you on de-installation of the BT CrowdStrike Service that are equal to the then current rates for Installation Charges on the date of de-installation.
Customer Security Policy or “CSP” means the Customer’s security policy containing the security rules, set and owned by the Customer, that are applied to the applicable Associated Service and determine the operation of the applicable Associated Service.
Customer Security Policy means the security policies set by Customer that enforce the rules for transit traffic into its network at the application level, as well as at the port and protocol level.
Customer Security Policy. (“CSP”) means the rules that are set and owned by the Customer, that dictate the operation of the Service.
Customer Security Policy means the Customer’s policy for the security of their network, systems and Users. Customer Specific Network means the connectivity, including firewalls and load balancing, between the Server Instances forming part of the Service delivering secure discrete separation. Data Centrethe facility which Umbrellar provides the Services from and where Service Components are hosted and made available for Customer use. Disk means a physical media on which data can be stored. Disk Utilisation means the volume of disk space used, measured against the Customer’s pre-allocated usable disk space.

Related to Customer Security Policy

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Fair Use Policy means the fair use policy governing the Support Services attached in Exhibit 1, as may be amended by WSP from time to time.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Procurement Policy means ADB’s Procurement Policy - Goods, Works, Nonconsulting and Consulting Services (2017, as amended from time to time);

  • Health insurance policy means a policy that provides specified benefits for hospital and/or general treatment and meets all requirements under section 63-10 of the Private Health Insurance Act 2007.

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • City Policies means any or all (as the context requires) of those procedures, standards and/or standard specifications, requirements, policies and the like listed in Schedule H or notified to the Supplier from time to time, as the same may be updated, modified, expanded, revised, supplemented and/or replaced from time to time by the City (as notified to the Supplier);

  • Primary Insurance Policy Each policy of primary mortgage guaranty insurance or any replacement policy therefor with respect to any Mortgage Loan.

  • Special Primary Insurance Policy Any Primary Insurance Policy covering a Mortgage Loan the premium of which is payable by the Trustee pursuant to Section 4.04(a), if so identified in the Mortgage Loan Schedule. There are no Special Primary Insurance Policies with respect to any of the Mortgage Loans.

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Mobile food vendor means every corporation, association, joint stock association, person, firm or partnership, their lessees, directors, receivers, trustees, appointees by any court whatsoever, or the heirs, executors, administrators, or personal representatives or assignees of any deceased owner, owning, controlling, operating or managing any mobile food vending unit.

  • Privacy Policy means the terms which set out how we will deal with confidential and personal information received from you via the Website;

  • Support Services Policy means Elastic’s support services policy for a Product, as further described at a URL referenced in an applicable Addendum.

  • Company Privacy Policy means each external or internal, past or present privacy policy of the Company, including any policy relating to (i) the privacy of users of the Company Products or of any Company Website, (ii) the collection, storage, disclosure, and transfer of any User Data or Personal Data, and (iii) any employee information.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Policy means Related Party Transaction Policy.

  • Operations Manual means a manual containing procedures, instructions and guidance for use by operational personnel in the execution of their duties;

  • Provider of financial assurance means an entity that provides financial assurance to an Owner or Operator of an underground storage tank through one of the mechanisms listed in these Regulations, including a guarantor, insurer, risk retention group, surety, issuer of a letter of credit, issuer of a state required mechanism, or a state.

  • Copayment means that you pay a fixed amount each time you fill a prescription.