Firewalls Sample Clauses

POPULAR SAMPLE Copied 13 times
Firewalls. Firewalls must be used for the isolation of all environments, to include physical, virtual, network devices, production and non-production, and application/presentation layers. Firewall management must follow a process that includes restriction of administrative access, and that is documented, reviewed, and approved, with management oversight, on a periodic basis.
Firewalls. State the specifications of the firewalls in use. Who manages them? Specify the services, tools and connectivity required to manage the firewalls.
Firewalls i) Jamf will have appropriate firewalls in place which will only allow documented and approved ports and services to be used. All other ports will be in a deny all mode.
Firewalls. Smartsheet will install and maintain firewall(s) to protect data accessible via the Internet.
Firewalls. Accounting Agent will maintain current industry appropriate firewall technology in the operation of Accounting Agent’s environments.
Firewalls. (a) Except as otherwise approved by Company in writing, Bank’s Key Program Management Resources shall not provide any services to or support for any co-branded or private label credit program that is or may be offered by Bank on behalf of or in association with any Competing Retailer during the period when such an employee is providing services or support to the Program and for a period of [*] after such an employee stops providing services or support to the Program. (b) Bank shall not use any Confidential Information of Company for the benefit of any other payment product program owned or operated by Bank except as expressly permitted in this Agreement.
Firewalls. Custodian will maintain current industry appropriate firewall technology in the operation of Custodian’s environments.
Firewalls. The power transformer must include the installation of firewalls built from reinforced concrete, to isolate it from other structures and equipment and alternatively constructions and/or new technology materials. For this purpose, the proper support, in the definitive engineering documents for evaluation by the GRANTOR shall be submitted.
Firewalls. Convercent will deploy reasonably appropriate firewall technology in the operation of Convercent’s sites. Traffic between Customer and Convercent will be protected and authenticated by industry standard cryptographic technologies. Specifically, firewall(s) must be able to effectively perform the following functions: stateful inspection, logging, support for all IPSec standards and certificates, support for strong encryption and hashing, ICMP and SNMP based monitoring and anti-spoofing.
Firewalls. In the event that a Party or its Affiliates has a research or development program outside this Agreement that competes with a publicly-known research or development program of the other Party outside this Agreement, then such Party shall put in place appropriate firewall arrangements reasonably acceptable to the other Party such that the applicable programs are segregated from the Research Programs and EDPs conducted