Infrastructure Security Sample Clauses
The Infrastructure Security clause establishes requirements and standards for protecting the physical and digital infrastructure used to deliver services or store data. It typically mandates that the service provider implement security measures such as access controls, monitoring, and regular vulnerability assessments to safeguard against unauthorized access or breaches. This clause ensures that both parties are clear on the expectations for maintaining a secure environment, thereby reducing the risk of data loss, service disruption, or security incidents.
POPULAR SAMPLE Copied 3 times
Infrastructure Security. Processor personnel are required to follow security policies that define access privileges and control for the transmission, processing, and storing of sensitive data. Processor conducts annual risk assessments on system and networking components which include systems, data, computers, personal devices, applications, facilities, connections, individuals, documentation, and electronic media, where confidential, sensitive data is present. Personnel are required to execute an Information Security policy and must acknowledge receipt of, and compliance with, Processor’s security policies.
Infrastructure Security. Consultant will install and maintain anti-virus software, apply all system patches and updates provided from primary vendors for operating systems, middleware, and hardware and, to the extent possible, use real time protection features. Consultant will not introduce any viruses, time or logic bombs, Trojan horses, worms, timers, clocks, trap doors, or other computer instructions, devices, or techniques that erase data or programming, infect, disrupt, damage, disable, or shut down Board’s system or any component of Board’s system, including, without limitation, its security or data. In the event a virus or similar issue is found to have been introduced into Board’s system by Consultant, Consultant will, at its sole expense:
(a) use commercially reasonable efforts to correct, reduce or eliminate the effects of the virus or similar issues affecting the Board’s system; and (b) if the virus or similar issue causes a loss of operational efficiency or loss of data, mitigate, restore and reimburse the Board for all such losses; and (c) cooperate with the Board or other impacted party in all ongoing, reasonable, and lawful efforts to mitigate or rectify such Security Incident or Data Breach including complying with applicable breach notification laws. (Consultant liability hereunder is limited as provided in 10.2 below.)
Infrastructure Security. The 4me Infrastructure will be electronically accessible to 4me staff, contractors and any other person as necessary to provide the Services. 4me will maintain access controls and policies to manage what access is allowed to the 4me Infrastructure from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. 4me will maintain corrective action and incident response plans to respond to potential security threats.
Infrastructure Security. 6.1 The Service Provider shall ensure that all networks used by the Service Provider in the provision of the service are secure and protected from unauthorised access.
6.2 The Service Provider shall ensure that any Confidential Information and any Personal Data transmitted over public networks is encrypted and transmitted Schedule 6 – Security Policy
6.3 The Service Provider shall ensure that all transfers of data are secure including but not limited to those using removable media.
6.4 The Service Provider shall inform TfL within twenty-four (24) hours of identifying a Security Incident from time to time. Schedule 6 – Security Policy ANNEX A INITIAL SECURITY PLAN It is recognised that as this Annex has been prepared by the Service Provider, there may be some apparent conflict or inconsistency between the terms of this Annex and the other terms of the Agreement. In the event of any such conflict or inconsistency, the other terms of the Agreement shall take precedence in the order set out in Clause 1.5 of the Agreement (save that, for the avoidance of doubt, this Annex and the Annexes to Schedule 8 shall have the lowest order of precedence in relation to all of the annexes and appendices in this Agreement).
Infrastructure Security. 5.4.1 The Service Provider shall comply with the provisions of schedule 6
Infrastructure Security. Interconnection Customer shall comply with the requirements for infrastructure and operational security of the S-Line Upgrade Project implemented pursuant to the CAISO Tariff, including the CAISO’s standards for information security posted on the CAISO’s internet web site at the following internet address: ▇▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/pubinfo/info- security/index.html and Applicable Reliability Standards.
Infrastructure Security. Rewind’s services are hosted on Amazon Web Services (AWS). AWS provides many layers of security as is known for being the most secure infrastructure provider on the planet. For full details of the AWS data center security controls, please refer to: AWS Data Center Controls ● Rewind regularly performs security and risk assessments on AWS’s security and privacy controls, and reviews AWS’s security and compliance documentation to ensure AWS security controls are in line with industry standard best practices to protect Rewind customer data
Infrastructure Security. The web servers as entry points for the entire system are completely independent systems to the database server. They run on the latest stable Debian version, access is only possible through SSH via key authentication. For the CCH, we use an NGINX, configured as a reverse proxy, listening on port 3000 (SSL on). The NGINX proxies all connect to a "Thin Webserver" which is used as an API server. It is not reachable from the Internet itself, because it did not bind any TCP sockets by itself. All other servers (Database and Filestore- Server) are in a virtual network. They are only accessible through the API-providing web server, with a valid API key, and for system administration purpose through SSH via key authentication only. As we are running two different database models (REDIS in combination with a ▇▇▇▇▇▇▇▇▇ cluster) we have two different data backup strategies. As the REDIS database is only used for real-time time data, real-time analytics and real-time communication, and only keeps rapidly changing data with a foreseeable database size, we don’t backup the data here. To store data via a longer timeframe and to archive data, we use a ▇▇▇▇▇▇▇▇▇ Cluster with several nodes. The big advantage of ▇▇▇▇▇▇▇▇▇ is that is brings its own backup utilities and restore process. The server nodes are spread over multiple data centres and sites and the data is replicated between these nodes. Data restoration and recovery is usually needed only in cases where all replications of a data set are lost, or corrupted data is written to the database. For this worst-case scenario, we backup one node additionally via Bacula [1] on a separate node. All servers of the central infrastructure are operated by ECO / DE-CIX and are running in a secured and ISO-27001-certified Data-Centre. The data centre has an electronic access control system, with a 24/7 camera monitoring of entrances and server rooms secure the servers against unauthorized physical access. Remote access is only possible via a SSH with Key Authentication and a VPN-connection only, which is even limited to a very few system administrators, with user rights and the possibility to get "root"-access via "sudo". The default root login is disabled by default. The following are the characteristics of the CCH servers and the security mechanisms put in place: API Server ▇▇▇▇▇▇▇▇▇.▇▇▇.▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ Open Ports HTTPS via port 3000 and 8080 Security mechanisms There is no FTP and no direct SSH access to this server. Ac...
Infrastructure Security. Consultant will install and maintain anti-virus software, apply all system patches and updates provided from primary vendors for operating systems, middleware, and hardware and, to the extent possible, use real time protection features. Consultant will not introduce any viruses, time or logic bombs, Trojan horses, worms, timers, clocks, trap doors, or other computer instructions, devices, or techniques that erase data or programming, infect, disrupt, damage, disable, or shut down Board’s system or any component of Board’s system, including, without limitation, its security or data. In the event a virus or similar issue is found to have been introduced into Board’s system by Consultant, Consultant will, at its sole expense:
(a) use commercially reasonable efforts to correct, reduce or eliminate the effects of the virus or similar issues affecting the Board’s system; and (b) if the virus or similar issue causes a loss of operational efficiency or loss of data, mitigate, restore and reimburse the Board for all such losses; and (c) cooperate with the Board or other impacted party in all ongoing, reasonable, and lawful efforts to mitigate or rectify such Security Incident or Data Breach including complying with applicable breach notification laws. (Consultant liability hereunder is limited as provided in 10.2 below.) Any officer, employee, contractor or agent of the Consultant who knowingly or willfully discloses Board Data in a manner that is not authorized or falsifies, conceals, or covers up by any trick, scheme, or device a material fact, makes any materially false, fictitious, or fraudulent statement or representation, or makes or uses any false writing or document to obtain Board Data, will be subject to appropriate sanctions including referral for criminal prosecution. The Consultant will also investigate and, as necessary, impose sanctions on its employees and agents for such actions.
Infrastructure Security. ● Datadog maintains system clock synchronization across all applicable systems in relation to the Services. Amazon Web Services, Inc. ▇▇▇ ▇▇▇▇▇ ▇▇▇▇▇▇ North Seattle, WA 98109 United States Datadog customers can deploy solutions on an AWS cloud computing environment that provides compute, power, storage, and other application services over the Internet as their business needs demand. Atlassian Pty Ltd (Jira) ▇▇▇ ▇▇▇▇ ▇▇▇▇▇▇, Floor 13 San Francisco, CA 94104 United States Datadog uses Jira issue-tracking software to manage support requests from customers. Google LLC (G Suite) ▇▇▇▇ ▇▇▇▇▇▇▇▇▇▇▇▇ ▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇, ▇▇ ▇▇▇▇▇ ▇▇▇▇▇▇ ▇▇▇▇▇▇ Datadog uses this office suite to (1) communicate with customers in some cases, and (2) manage and organize customer requests. Google LLC (Google Cloud Platform) ▇▇▇▇ ▇▇▇▇▇▇▇▇▇▇▇▇ ▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇, ▇▇ ▇▇▇▇▇ ▇▇▇▇▇▇ ▇▇▇▇▇▇ Datadog customers can deploy solutions on a GCP cloud- computing environment that provides compute, power, storage, and other application services over the Internet as their business needs demand. Mailgun Technologies, Inc. ▇▇▇ ▇ ▇▇▇▇▇ ▇▇ #▇▇▇▇ ▇▇▇ ▇▇▇▇▇▇▇, ▇▇ ▇▇▇▇▇ ▇▇▇▇▇▇ ▇▇▇▇▇▇ Datadog uses this (1) as a backup email relay to send emails to Datadog customers or customer’s users as part of the Datadog services (including, for example, monitor alerts, reports, and account modification), and (2) to receive emails from services or people (e.g., emails from ▇▇▇▇@▇▇▇▇▇▇▇▇▇.▇▇▇).