Intrusion Detection Systems. The Vendor must implement and comply with Customer's preferred security protocols, including but not limited to Single Sign On and Secure Email.
Appears in 2 contracts
Sources: Third Party Administrator Agreement (Separate Account Va-K of Commonwealth Annuity & Life Insurance Co), Third Party Administrator Agreement