Common use of Network Architecture Clause in Contracts

Network Architecture. 6.1.1. The Contractor Platform shall be protected behind a layer of firewalls. 6.1.2. At County’s request, Contractor shall submit a network architecture diagram of County’s stored and transmitted data, including the location of the data center and details of connectivity for all third parties who have access to County Data. Any network security changes implemented by Contractor must not compromise the security of County Data. Contractor shall ensure that all database servers are protected behind a second set of internal firewalls. 6.1.3. Contractor shall restrict inbound and outbound traffic to County’s network to “deny all, permit by exception” configuration. 6.1.4. Contractor’s wireless networks connected to the Contractor Platform shall at a minimum, be configured for Wi-Fi Protected Access 2 (WPA2)-Enterprise using Advanced Encryption Standard (AES) and Protected Extensible Authentication Protocol (PEAP), or current industry security standards (whichever is higher) to secure and protect County data.

Appears in 3 contracts

Sources: Supplemental Insurance Agreement, Third Party Administration Agreement, Service Level Agreement