BEST PRACTISE SECURITY POLICIES Sample Clauses

BEST PRACTISE SECURITY POLICIES. 3.1 As part of the Subscription, the Supplier will enforce secure, best practise threat protection policies for endpoint protection. to These policies will dictate the automated behaviour of the software for the purposes of; 3.1.1 detection of known malware; 3.1.2 “in-cloud” checks to allow detection of the latest malware known to Sophos; 3.1.3 proactive detection of malware that has not been seen before; 3.1.4 automatic clean-up of malware; and 3.1.5 server endpoints only, automatic exclusion of activity by known applications from scanning. 3.2 If the Customer requires changes to be made to any automated policy, amendments can be made by the Supplier: either (i) by way of Professional Services on a time and materials basis, or (ii) if Managed Security Support, where purchased by the Customer pursuant to an Order. 3.3 The Sophos Intercept X Essentials product does not have the functionality to make changes. An upgrade to Intercept X Advanced must be purchased from the Supplier or Sophos.

Related to BEST PRACTISE SECURITY POLICIES

  • Security Policies To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. The Contractor shall provide the State with not less than thirty (30) days advance written notice of any material amendment or modification of such policies.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Management; Community Policies Owner may retain employees and management agents from time to time to manage the Property, and Owner’s agent may retain other employees or contractors. Resident, on behalf of himself or herself and his or her Guests, agrees to comply fully with all directions from Owner and its employees and agents, and the rules and regulations (including all amendments and additions thereto, except those that substantially modify the Resident’s bargain and to which Resident timely objects) as contained in this Agreement and the Community Policies of the Property. The Community Policies are available at ▇▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/policies.pdf or on request from the management office and are considered part of this Agreement.