E-MAIL SECURITY. a. Vendor will: (1) for anti-spam: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; Confidential Exhibit A-8 — Enterprise Security Management Services (b) scan ACI’s inbound e-mail for spam; (c) provide ACI with the capability to create filters to prevent spam and allow e-mail (i.e., black list, white list); (d) using ACI provided black list and white list, identify spam and take action in accordance with the e-mail security policy (i.e., tag, redirect, delete); (e) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and (f) provide weekly and monthly security reports via e-mail. (2) for porn filtering: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; (b) scan ACI’s inbound and outbound e-mail to detect potentially suspected pornographic images; (c) implement sensitivity settings and routing options in accordance with the e-mail security policy (for example, e-mail containing suspect images can be logged only, tagged, sent or copied to a designated system administrator or deleted); (d) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and (e) provide weekly and monthly security reports via e-mail. (3) for e-mail Antivirus: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; (b) scan ACI’s Internet level e-mail to detect viruses (i.e., known and unknown); (c) notify appropriate contact (for example, e-mail sender, intended recipient, e-mail administrator), in accordance with the established procedures, if an e-mail or attachment contains a virus; (d) handle infected e-mail in accordance with the established procedures; (e) notify ACI of any virus infected e-mail that Vendor was unable to intercept; Confidential Exhibit A-8 — Enterprise Security Management Services (f) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics as well as offers a number of configuration and management facilities; and (g) provide weekly and monthly security reports via e-mail. b. ACI will: (1) configure an anti-spam black list and white list; (2) provide ACI’s business guidelines for End User e-mail security and any updates as they occur; (3) assist Vendor in developing and implementing the e-mail security policy, including violation reporting procedures; (4) address any virus infected e-mail that Vendor was unable to intercept; and (5) provide contact and IT infrastructure information and any updates as they occur.
Appears in 2 contracts
Sources: Master Services Agreement (Aci Worldwide, Inc.), Master Services Agreement (Aci Worldwide, Inc.)