Common use of Intrusion Detection Clause in Contracts

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s intrusion detection involves:

Appears in 5 contracts

Sources: Google Cloud Master Agreement, Google Cloud Master Agreement, California Student Data Privacy Addendum

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s intrusion detection approach to this involves: 1. Tightly controlling the size and make-up of Google’s attack surface through preventative measures; 2. Employing intelligent detection controls at data entry points; and 3. Employing technologies that automatically remedy certain dangerous situations.

Appears in 4 contracts

Sources: Google Apps for Education Agreement, Google Apps for Education Agreement, Google Apps for Education Agreement

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s intrusion detection involves:: (i) tightly controlling the size and make-up of Google’s attack surface through preventative measures; (ii) employing intelligent detection controls at data entry points; and (iii) employing technologies that automatically remedy certain dangerous situations.

Appears in 2 contracts

Sources: Google Workspace for Education Terms of Service, Google Cloud Platform Terms of Service for G Cloud 14

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s Google intrusion detection involves: 1. Tightly controlling the size and make-up of the attack surface through preventative measures; 2. Employing intelligent detection controls at data entry points; and 3. Employing technologies that automatically remedy certain dangerous situations.

Appears in 1 contract

Sources: Data Processing Agreement

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s 's intrusion detection involves:

Appears in 1 contract

Sources: Data Processing Agreement

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s intrusion detection involves:: (i) tightly

Appears in 1 contract

Sources: Master Agreement

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s Google’s intrusion detection involves:

Appears in 1 contract

Sources: Cloud Data Processing Addendum

Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s Google intrusion detection involves:

Appears in 1 contract

Sources: Data Processing Amendment