Network and Communications Security Sample Clauses
POPULAR SAMPLE Copied 1 times
Network and Communications Security. A. Asset Management. BNYM will maintain an inventory of its system components, hardware and software used to provide the services, and will review and update such inventory in accordance with the ISP.
Network and Communications Security. 2.1 All Processor connectivity to Controller computing systems and/or networks and all attempts at same shall be only through Controller’s security gateways/firewalls and only through Controller-approved security procedures.
2.2 Processor will not access, and will endeavor its best efforts to prevent unauthorized persons or entities to access,Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization.
2.3 Processor will take appropriate measures to ensure that Processor’s systems connecting to Controller’s systems and anything provided to Controller through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Controller’s systems.
2.4 Processor will maintain technical and organizational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
Network and Communications Security. 3.1. All Poppulo connectivity to Customer information systems shall be through secured remote access mechanisms.
3.2. Poppulo will use best industry practice to ensure that Poppulo’s systems connecting to Customer’s systems and anything provided to Customer through such systems does not knowingly contain any malicious code designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment to the operation of the Customer’s systems.
3.3. At end-of-life, all electronic storage media containing Protected Data will be wiped or degaussed for physical destruction or disposal, in a manner meeting forensic industry standards such as the NIST SP800-88 Guidelines for Media Sanitisation. Destruction of Protected Data on paper shall be by shredding, either by Poppulo or an approved third party. Poppulo will maintain documented evidence of data erasure and destruction. This evidence will be available for review at the request of Customer.
Network and Communications Security. Markit shall:
2.1 Deploy multiple layers of defence on Markit’s systems including firewalls, network intrusion detection, and host-based intrusion detection systems. All security monitoring systems, including firewalls and intrusion detection systems, must be monitored twenty-four (24) hours per day, three hundred and sixty-five (365) days per year.
2.2 Notify Subscriber as soon as commercially feasible and provide Subscriber, within 5 days of the closure of the incident, if an incident takes place that involves the systems, employees or software used to provide goods and/or services to Subscriber and provide Subscriber with a written report describing the incident, actions taken during the response, and plans for future actions to prevent a similar incident from occurring in the future.
2.3 Configure its firewalls, network routers, switches, load balancers, name servers, mail servers, and other network components in accordance with industry best practices.
2.4 Where Subscriber so requests upon reasonable grounds, and based upon information received by Subscriber about specific and realistic vulnerabilities and threats, to restrict access within Markit to any Subscriber-specific component (if any) of Markit’s networks, systems, and applications used to provide the Services.
2.5 Deploy firewalls, filtering routers, or other similar network segmentation devices between networks providing services anticipated by this agreement and other Markit networks to control network traffic and minimise exposure to a network compromise.
Network and Communications Security. A. Asset Management. BNY Mellon will maintain an inventory of its system components, hardware and software used to provide the services under the Agreement, and will review and update such inventory in accordance with the ISP.
Network and Communications Security. Each Party shall deploy security controls in a multi-layered approach, including intrusion detection and anti-virus systems. All security control layers shall log and notify any unusual activity twenty-four (24) hours per day, three hundred sixty five (365) days a year. Administrators shall review logs regularly (at least monthly) and respond to alerts within a reasonable amount of time. Logs shall be archived onto a write once/read only media for a reasonable amount of time and be accessible for investigation purposes.
Network and Communications Security. 2.1 All Processor connectivity to Controller computing systems and/or networks and all attempts at same shall be only through Controller’s security gateways/firewalls and only through Controller-approved security procedures.
2.2 Processor shall not access and will not permit unauthorized persons or entities to access Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization.
2.3 Processor shall take appropriate measures to ensure that Processor’s systems connecting to Controller’s systems and anything provided to Controller through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Controller’s systems.
2.4 Processor shall maintain technical and organisational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
Network and Communications Security. 2.1 All Processor connectivity to Controller computing systems and/or networks and all attempts at same shall be only through Controller’s security gateways/firewalls and only through Controller- approved security procedures.
2.2 Processor shall not access and will not permit unauthorized persons or entities to access Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization.
2.3 Processor shall take appropriate measures to ensure that Processor’s systems connecting to Controller’s systems and anything provided to Controller through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Controller’s systems.
2.4 Processor shall maintain technical and organisational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, DocuSign Envelope ID: C4A38869-A3F1-4CE0-B47A-92E708DD700D viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
Network and Communications Security o At the Hosting Facility site, deploy multiple layers of defense, specifically firewalls, host/network-based intrusion detection and proxy services to increase the effort required to compromise network(s), system(s) or application(s) and to increase the probability that such attempts will be detected. o Configure firewalls, network routers, switches, load balancers, name servers, mail servers, and other network components in accordance with commercially reasonable industry standards. o Minimize the potential for external unauthorized access to Liberty Software systems through the use of firewalls, filtering routers, or other similar network segmentation devices. o All security monitoring systems including, but not limited to, firewalls and intrusion detection systems must be monitored 24 hours per day, 365 days per year.
Network and Communications Security. 2.1 Except in the ordinary course of providing the System as anticipated under the Agreement, SunGard and its personnel will not access Customer computing systems and/or networks without Customer’s authorization and any such actual or attempted access shall be consistent with any such authorization.
2.2 To the extent commercially available, SunGard shall use industry standard tools on the System, as well as on SunGard-managed networks that are used in providing the System, to ensure that the System does not contain any computer code, programs, mechanisms or programming devices designed to disrupt, unintentionally modify or delete, damage, deactivate, disable, harm or otherwise impede, in any manner, the operation of the System or Customer’s systems which connect to the System. For the avoidance of doubt, the foregoing shall not preclude SunGard from including in the System features and functionality that may restrict use for security purposes or to enforce any contractual scope of use.