Infrastructure Protection Clause Samples

Infrastructure Protection. Notified shall maintain industry standard procedures to protect Notified Processing Resources, including, at a minimum: i. Formal security programs (policies, standards, processes, etc.); ii. Processes for becoming aware of, and maintaining, security patches and fixes; iii. Router filters, firewalls, and other mechanisms to restrict access to the Notified Processing Resources, including without limitation, all local site networks which may be accessed via the Internet (whether or not such sites transmit information); iv. Resources used for mobile access to Customer Information Systems shall be protected against attack and penetration through the use of firewalls; and v. Processes to prevent, detect, and eradicate malicious code (e.g., viruses, etc.) and to notify Customer of instances of malicious code detected on Notified Processing Resources impacting Customer Information.
Infrastructure Protection. West shall maintain industry standard procedures to protect West Processing Resources, including, at a minimum: i. Formal security programs (policies, standards, processes, etc.); ii. Processes for becoming aware of, and maintaining, security patches and fixes; iii. Router filters, firewalls, and other mechanisms to restrict access to the West Processing Resources, including without limitation, all local site networks which may be accessed via the Internet (whether or not such sites transmit information); iv. Resources used for mobile access to Customer Information Systems shall be protected against attack and penetration through the use of firewalls; and v. Processes to prevent, detect, and eradicate malicious code (e.g., viruses, etc.) and to notify Customer of instances of malicious code detected on West Processing Resources impacting Customer Information.
Infrastructure Protection. Global shall maintain procedures satisfying generally accepted industry standards designed to protect Global Processing Resources, including, at a minimum: *****
Infrastructure Protection. Planet Payment shall maintain and adhere to procedures satisfying generally accepted industry standards (including PCI-DSS) designed to protect Planet Payment Services Resources, including, at a minimum: (a) Formal, comprehensive security program (policies, standards, processes, etc.); (b) Processes for becoming aware of, and maintaining, security patches and fixes; (c) Router filters, firewalls, and other mechanisms to restrict access to the Planet Payment Services Resources; (d) Processes to prevent, detect, and eradicate malicious code (e.g., viruses, etc.); and (e) Processes to test regularly the efficacy of Planet Payment’ security program (e.g., at least annual penetration testing) and promptly correct any identified deficiencies.
Infrastructure Protection. To the extent applicable to the provision of the services provided to Customer, Cognizant shall maintain policies and procedures to protect Cognizant Infrastructure, including: (a) security programmes (policies, standards, processes, etc.); (b) processes for becoming aware of, and maintaining, security patches and fixes; (c) procedures for employing mechanisms to restrict access to the Cognizant Infrastructure, including all local- site networks that may be accessed via the internet (whether or not such sites transmit information); (d) procedures designed to protect the Cognizant Infrastructure against attack and penetration; and (e) processes designed to prevent, detect, and eradicate viruses.
Infrastructure Protection. The Company shall replace and/or repair, at its own expense, all infrastructure damaged by the Company’s operation of the Facility. This includes but is not limited to utility poles, pipes, culverts, ditches, ▇▇▇▇▇▇, pumps, lift stations, and landfill gas collection infrastructure.
Infrastructure Protection. London Underground

Related to Infrastructure Protection

  • Infrastructure Modification of the location and/or sizing of the infrastructure for the Project that does not materially change the functionality of the infrastructure.

  • Fire Protection Contractor shall take adequate and reasonable precautions to protect the Work against damage by fire and smoke. For example, without limitation, Contractor shall do the following:

  • Eye Protection Where an employee is required by the College or by legislation, in order to perform his/her duties, to acquire and wear prescription eye protection, the employee shall provide the College with proof of purchase by March 1 each year and the College shall reimburse to such employee, on the first pay day of April in each year, up to a maximum of twenty dollars ($20.00); in situations other than the foregoing, the College, may in its discretion, (which discretion shall not be unreasonably exercised) reimburse such expense where it is recommended by the health and safety committee constituted under the Occupational Health and Safety Act.

  • Income Protection All workers will be covered by the extended Incolink Leisure Time Insurance and Income protection Scheme which provides defined weekly payments ($500 per week to workers with dependants, $400 per week to workers without dependants) for up to a maximum 104 weeks in the event of an extended work absence arising from any personal illness or injury (whether or not work related). The costs of this benefit will be shared between Incolink and the company on a 30/70 basis. Agreed premium costs will be: Incolink - $2.10 per week/worker Employer - $4.90 per week/worker It is a condition of the company’s agreement to provide this benefit that premium costs be maintained at not more than the February 1998 equivalent. In the event of premium costs escalating, the parties are agreed that the benefits table will be revised downwards so as to contain premium costs within the agreed limits. To maintain this cover the company agrees to pay the amounts every week for each employee. In the event the company does not maintain the above policy, the company will be liable in full to pay equivalent benefits to an employee who meets eligibility criteria as set out in the policy document.

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes: a. Systems containing DSHS Data must have all security patches or hotfixes applied within 3 months of being made available. b. The Contractor will have a method of ensuring that the requisite patches and hotfixes have been applied within the required timeframes. c. Systems containing DSHS Data shall have an Anti-Malware application, if available, installed. d. Anti-Malware software shall be kept up to date. The product, its anti-virus engine, and any malware database the system uses, will be no more than one update behind current.