Data Center Security Sample Clauses
Data Center Security. All data centers comply with or exceed the security requirements of SOC2. All data centers are equipped with CCTV, on-site security personnel and key card access system.
Data Center Security. Licensor shall take reasonable actions to ensure the security of the Data Center while performing Licensor’s duties. Licensor agrees to comply with the State’s security policies/rules, procedures and processes. State’s security polices/rules, procedures and processes may be revised from time to time. These revisions, or any additions shall be posted in the common areas or otherwise provided to Licensor by the State. State may issue additional security policies/rules, procedures and processes as deemed necessary. Licensor acknowledges that security cameras are in use throughout the Data Center. All persons, whether employees, representatives or invitees of Licensor, granted access to the Data Center are subject to security screening conducted by the State. This includes, but is not limited to, providing acceptable personal picture identification. The individual must be on the personnel listing provided to the State by Licensor. State may refuse access to the Data Center to any person who, in State’s sole discretion, presents an unreasonable security risk. Licensor must report any physical security related incidents at the Data Center to Data Center personnel immediately. The security system requires that all doors be closed at all times, and lights be turned off except while an area is occupied. Secure all doors on exiting an area, and in areas that do not have automatic lights, turn off the lights to conserve energy. Temporary blocking of a door for the movement of equipment is permitted but doors must be closed immediately after equipment movement. Licensor shall be responsible for securing the premises upon completion of the work. No door or gate shall remain unlocked. Badge Access with BIO-finger print reader shall be utilized for access to the Data Center. Licensor shall be responsible for keys, and badges assigned and all costs related to replacement of lost badges or lost keys or replacement of locks. All persons, whether employees, representatives or subcontractors granted access to the Data Center shall badge through a secured door. No “piggybacking” or "tailgating" is permitted. Only employees of Licensor shall be allowed in the building. No family members, friends or pets (except service animals) shall be allowed access. Only on an emergency basis may access be allowed without background checks. Licensor is not allowed to take or distribute photos or videos of the Data Center without written permission from State Information Technology Services D...
Data Center Security. In connection with providing the Web Hosting Services described below, Sabre will provide facility and resource security services at the Tulsa Data Center as follows:
Data Center Security. OneNeck shall provide the following services, which shall comprise “Data Center Security Services,” provided, however, that any obligations set forth in this Article 2.2 shall be in addition to and shall in no way limit any other obligations of OneNeck regarding security as may be required by Client.
2.2.1. OneNeck shall, for any and all matters concerning the Services, perform reasonable security actions as may be agreed to by Client and OneNeck.
2.2.2. OneNeck shall protect the Data Center against unauthorized access. OneNeck shall monitor and maintain Physical Security at the Data Center; limiting access to authorized personnel only.
2.2.3. OneNeck shall provide operator-attended Data Center operations twenty-four (24) hours per day, every day of the year.
2.2.4. OneNeck shall perform routine monitoring of the Data Center facility.
2.2.5. OneNeck shall provide escorted Data Center facility access to Client representatives provided written notification with purpose and intent is provided to OneNeck twenty four (24) hours in advance of the visit.
2.2.6. OneNeck shall provide escorted Data Center facility access to Client 3rd party vendor representatives only when Client provides written notification and authorization, including purpose and intent, to OneNeck two (2) weeks in advance of the visit.
2.2.7. OneNeck agrees to make a reasonable effort to maintain the Physical separation of the Client computing environments from any other computing environments over which OneNeck can exercise control, except for those required to provide the Services.
2.2.8. OneNeck will also perform and enforce any data center security process agreed upon by the Parties to provide secure data tapes transport between the Data Center facility and off-site storage facility.
Data Center Security. (a) CSG will undertake and maintain physical, administrative, and technical safeguards and other security measures necessary to ensure the security and confidentiality of (x) Charter Customer Information, and (y) CSG-supplied assets, systems and software. As part of the Services, CSG will maintain and enforce at each data center, and all other locations where services relating directly or indirectly to the Services are performed, safety and physical and computer system security procedures that are at least (i) equal to current industry standards for such types of service locations; and (ii) as rigorous as those procedures in effect at the service location as of the effective date of the Agreement. In the event that CSG becomes aware of a potential compromise to the security of a data center, CSG will, [****** * ************ ********** ****], notify Customer of such potential compromise after verifying the reasonable possibility of such potential compromise based upon plausible evidence. The parties will work together in good faith to isolate any potentially compromised host to determine the current security posture and whether further corrective action is necessary. However, CSG shall maintain control, discretion, and responsibility for infrastructure changes necessary to resolve any potential compromise.
(b) CSG must test the security of its systems used in connection with this Agreement on a [******** *****], as necessary to confirm system integrity and security as consistent with current industry standards and best practices. CSG is responsible for and shall conduct penetration testing of any Product, Service or system that contains [*** ****] to identify and remediate vulnerabilities in CSG’s environment. CSG further agrees to conduct such penetration testing and remediation of identified vulnerabilities based upon industry accepted penetration testing approaches (e.g., NIST SP800-115 or Payment Card Industry Standard). CSG shall:
(i) Employ a program of code analysis to identify security vulnerabilities in software code during the development process, and not issue a release that contains critical, high, or medium vulnerabilities using the Common Vulnerability Scoring System.
(ii) Perform vulnerability scans at least every [****** ****] days.
(iii) Perform penetration tests. Such penetration testing shall be: (i) conducted using appropriately qualified assessors; (ii) based on current industry accepted penetration testing approaches (for example, NIST...
Data Center Security. Only answer “
Data Center Security. Pearson utilizes state-of-the-art facilities provided by data center providers in multiple locations for housing and securing its application servers. ● Internet Data Centers – Pearson contracts with Internet data center service providers for physical hosting of our online learning application infrastructure. These service providers are required to comply with or exceed Pearson standards regarding information security and confidentiality. ● Equipment Housing at Data Centers - All systems are housed within locked cages or wholly dedicated and controlled areas within the hosting facilities. These facilities provide a secure and reliable infrastructure for highly available applications used worldwide. The highest quality equipment, practices, and staff are employed to ensure performance, reliability, and security. ● Control of Physical Access at Data Centers - Physical access to the cage areas is limited to individuals on the approved access control list. Such individuals must present photo identification to guards that are stationed 24/7. Specified Pearson personnel or authorized Pearson service providers maintain physical access authority at all times. Standing access to Pearson systems is restricted to employees of Pearson with a ‘need to access’.
Data Center Security. (a) PTC uses industry standard measures designed to protect the operating environment of the Services and Hosted Software against unauthorized physical access and the threats of fire, power, temperature, humidity and other physical forces in accordance with the following requirements:
i. A secure data center with physical access limited to authorized personnel and protected by multi-level security systems. Other persons are admitted only on an as-needed (such as to maintain hardware components) and supervised basis.
ii. Continuous, conditioned power supplied by a redundant power infrastructure, including battery backup systems and diesel- powered generators, with regular system testing for continuous availability.
iii. Redundant HVAC climate control and fire suppression systems.
(b) In addition to the physical access protections described above, PTC will provide the following with respect to the Hosted System and Hosted Data:
i. PTC will maintain controls consistent with the ISO 27001:2013 framework and PTC will be ISO 27001:2013 certified.
ii. Hosted Data in the production Hosted System will be backed up to a secure alternate location for disaster recovery purposes. Backups will be maintained in accordance with the terms defined in PTC Support Services Terms and Conditions. The alternate storage/ disaster recovery site will provide information security safeguards equivalent to that of the primary production site. PTC will provide a Host Based Security System (HBSS) that includes antivirus, antimalware and intrusion detection. PTC will conduct scanning, patching, monitoring, logging and protection of the network, infrastructure, databases, operating system and applications of the Hosted System. In the event viruses, worms or similar problems are determined to have infected the Hosted System, PTC will use commercially reasonable efforts to restore the Hosted System as quickly as reasonably possible.
iii. This subsection (b) shall not apply to Vuforia or Onshape Offerings.
(c) Customer is responsible for:
i. Ensuring it uses utmost discretion in granting administrator privileges.
ii. Ensuring that its Users do not share accounts and their passwords.
iii. Designing, authoring, validating, and approving all custom reports or any other integrations or customizations.
iv. Ensuring and maintaining security of its systems, machines and end user devices that connect to and use the Service, including implementation of necessary patches and operating system updates.
...
Data Center Security. At Licensee’s request, Nuventive shall provide Licensee with the name of any data center(s) or hosting location(s) used by Nuventive or its Third-Party Providers to host or store Licensee Data, including Personal Data, received from Licensee or its Users. All Licensee Data stored or at rest in any data centers or hosting locations used by Nuventive, or in transport, will be encrypted and will not be transferred (except with Licensee’s prior consent) to any data center or hosting location outside of the United States. Nuventive has implemented or will implement the Data Safeguards set forth in this Section 7, and Nuventive will further implement, or cause to be implemented by its Third-Party Providers, reasonable security standards that it determines are necessary, but in no event less than industry standards, to protect (i) the physical security of the data centers and hosting locations used to maintain Licensee Data; and (ii) Nuventive’s Network, all operating systems, software applications, and all data storage systems and media provided by Nuventive or its Third- Party Providers, from being subject to any viruses, malware or other harmful code.
Data Center Security. Vendor shall maintain an audited security program, such as SOC 2, ISO 27001, or Fed Ramp compliance standards. Vendor site(s) shall be highly restricted to both physical and electronic Access through public (internet) and private (intranet) networks to eliminate unwanted interruptions.