E-MAIL SECURITY Clause Samples
E-MAIL SECURITY. The use of encrypted and unencrypted e-mail carries a risk of possible interception and revelation to unintended parties. You should not use encrypted or unencrypted e-mail to send confidential information, such as social security numbers or account numbers.
E-MAIL SECURITY. Customers should not use unencrypted e-mail to send confidential information, such as social security numbers, account numbers, etc., to the Bank as these are not secure.
E-MAIL SECURITY a. Vendor will:
(1) for anti-spam:
(a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; Confidential Exhibit A-8 — Enterprise Security Management Services
(b) scan ACI’s inbound e-mail for spam;
(c) provide ACI with the capability to create filters to prevent spam and allow e-mail (i.e., black list, white list);
(d) using ACI provided black list and white list, identify spam and take action in accordance with the e-mail security policy (i.e., tag, redirect, delete);
(e) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and
(f) provide weekly and monthly security reports via e-mail.
(2) for porn filtering:
(a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures;
(b) scan ACI’s inbound and outbound e-mail to detect potentially suspected pornographic images;
(c) implement sensitivity settings and routing options in accordance with the e-mail security policy (for example, e-mail containing suspect images can be logged only, tagged, sent or copied to a designated system administrator or deleted);
(d) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and
(e) provide weekly and monthly security reports via e-mail.
(3) for e-mail Antivirus:
(a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures;
(b) scan ACI’s Internet level e-mail to detect viruses (i.e., known and unknown);
(c) notify appropriate contact (for example, e-mail sender, intended recipient, e-mail administrator), in accordance with the established procedures, if an e-mail or attachment contains a virus;
(d) handle infected e-mail in accordance with the established procedures;
(e) notify ACI of any virus infected e-mail that Vendor was unable to intercept; Confidential Exhibit A-8 — Enterprise Security Management Services
(f) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics as well as offers a number of configuration and management facilities; and
(g) provide weekly and monthly security reports via ...
E-MAIL SECURITY. IBM will:
E-MAIL SECURITY