E-MAIL SECURITY Clause Samples

E-MAIL SECURITY. The use of encrypted and unencrypted e-mail carries a risk of possible interception and revelation to unintended parties. You should not use encrypted or unencrypted e-mail to send confidential information, such as social security numbers or account numbers.
E-MAIL SECURITY. Customers should not use unencrypted e-mail to send confidential information, such as social security numbers, account numbers, etc., to the Bank as these are not secure.
E-MAIL SECURITY a. Vendor will: (1) for anti-spam: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; Confidential Exhibit A-8 — Enterprise Security Management Services (b) scan ACI’s inbound e-mail for spam; (c) provide ACI with the capability to create filters to prevent spam and allow e-mail (i.e., black list, white list); (d) using ACI provided black list and white list, identify spam and take action in accordance with the e-mail security policy (i.e., tag, redirect, delete); (e) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and (f) provide weekly and monthly security reports via e-mail. (2) for porn filtering: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; (b) scan ACI’s inbound and outbound e-mail to detect potentially suspected pornographic images; (c) implement sensitivity settings and routing options in accordance with the e-mail security policy (for example, e-mail containing suspect images can be logged only, tagged, sent or copied to a designated system administrator or deleted); (d) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and (e) provide weekly and monthly security reports via e-mail. (3) for e-mail Antivirus: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; (b) scan ACI’s Internet level e-mail to detect viruses (i.e., known and unknown); (c) notify appropriate contact (for example, e-mail sender, intended recipient, e-mail administrator), in accordance with the established procedures, if an e-mail or attachment contains a virus; (d) handle infected e-mail in accordance with the established procedures; (e) notify ACI of any virus infected e-mail that Vendor was unable to intercept; Confidential Exhibit A-8 — Enterprise Security Management Services (f) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics as well as offers a number of configuration and management facilities; and (g) provide weekly and monthly security reports via ...
E-MAIL SECURITY. IBM will:
E-MAIL SECURITY 

Related to E-MAIL SECURITY