Network Controls Sample Clauses

The Network Controls clause establishes requirements for the implementation and maintenance of security measures to protect a network and its data. Typically, this clause mandates the use of firewalls, intrusion detection systems, access controls, and regular monitoring to prevent unauthorized access or data breaches. Its core function is to ensure that robust safeguards are in place to mitigate cybersecurity risks and protect sensitive information from external and internal threats.
Network Controls. Contractor shall have, shall implement, and shall maintain network security controls, including the use of firewalls, layered DMZs and updated intrusion detection and prevention systems, reasonably designed to protect systems from intrusion or limit the scope or success of any attack or attempt at unauthorized access to City Data.
Network Controls. Genesys will employ effective network security controls based on industry standards to ensure that Customer Data is segmented and isolated from other customer environments within the Data Center. Controls include, but are not limited to: A) Segregated Firewall Services. Customer environments are segmented using physical and contextual firewall instances.
Network Controls. Supplier shall manage and control networks in order to protect UL Solutions from threats and to maintain security for the network, including information in transit. Supplier shall implement controls to ensure the security of information in networks and the protection of connected services from unauthorized access. Controls shall be implemented to ensure the availability of network services and information services using the network. Responsibilities and procedures shall be established for the management of equipment on the network, including equipment in user areas.
Network Controls. Data importer will secure all data and communications networks to ensure the protection of Personal Data.
Network Controls. August Schools manages, controls, and secures its networks, the connected systems, applications, and data-in-transit to safeguard against internal and external threats. August Schools must utilize network firewalls, web application firewalls, and/or equivalent mechanisms to safeguard applicable internet connections, internal network zones, and applications from threats. August Schools configures appropriate firewall alerts and alarms for timely response and investigation. This also applies to applicable wireless networks. August Schools ensures networking ports and protocols are restricted based on the principle of least functionality. Ports and network routes should only be open when there is proper business justification. Firewall configurations and rulesets are maintained. Firewall rules are implemented to minimize exposure to external threats. Significant changes to network services and configurations should be tracked in accordance with the Change Management Policy. As an additional layer of defense, August Schools utilizes monitoring solutions to detect and alert on network-based intrusions and/or threats. maintains network and data flow diagrams. Diagrams are reviewed and updated when significant network infrastructure changes occur. In addition to the Network Security Policy, August Schools establishes, documents, and reviews the Access Control and Termination Policy based on business and security requirements. This policy also encompasses network access control. August Schools segregates networks based on the required groups of information services, users, and systems. August Schools utilizes firewall configurations to restrict connections between untrusted networks and trusted networks. Additionally, August Schools may utilize security groups and network access control lists (NACLs) to improve network security for individual virtual machines.
Network Controls. Jostens ensures that all data and communications networks are secured to ensures the transmission of data is kept confidential. a. Applications, ports, services, and similar access points installed on a computer or network facility, which are not specifically required for business functionality, are disabled or removed; b. Network segments connected to the Internet are protected by a firewall which is configured to secure all devices behind it; c. Network segments where Jostens data resides are isolated from non-Jostens data, logically or physically unless approved by Jostens Security; d. User connection capability are documented with regard to messaging, electronic mail, file transfer, interactive access, and application access; e. All production servers are located in a secure, access-controlled location; f. Firewalls are configured properly to address all reasonably-known security concerns; g. Infrastructure diagrams, documentation, and configurations are up to date, controlled and available to assist in issue resolution; and h. Systems must have the ability to detect a potential hostile attack. (e.g., IDS/IPS) i. All systems are updated to the current release and actively monitored.
Network Controls. Networks are managed and controlled to protect information in systems and applications.
Network Controls. A current telecommunication network diagram shall be maintained. The telecommunication network diagram shall document all internal and external connections to TSM systems storing, processing or transmitting information (e.g., PII, ePHI). The diagram shall also include authorized wireless networks and Wireless Access Points (WAP). [Core-15(b)] The telecommunications network diagram shall be reviewed and updated based on the changes in the environment and no less than every 6 months. [Core-15(b)] TSM management shall implement telecommunications network controls to ensure the security of the IT assets and the protection of connected systems and active services from Policy No.: ISP#13 Page 63 Effective Date: 09/01/2016 Approval Date: 09/01/2016 Department: Information Security Last Review Date: 08/11/2016 Policy Name: Network Security unauthorized access as well as to ensure the availability of the required telecommunication network services in order to support the organization Business Continuity and Disaster Recovery strategy. [Core-15(b)]
Network Controls i) Vendor shall implement appropriate controls to ensure that only authorized devices are provisioned network access when physically connected to the network. ii) As necessary, Vendor shall provision logically or physically segregated network to allow guest access for visitors to their facilities. In no case shall Vendor allow guests, or other non-Vendor managed and controlled personnel, access to production networks. iii) Vendor shall implement technical controls to filter inappropriate and unnecessary web content including, but not limited to, pornography, gambling, violence, webmail, social media, etc. iv) All Vendor controlled wireless connections shall be secured utilizing Wi-Fi Protected Access 2 (“WPA2”) or better security protocol. v) Vendor shall ensure that interconnections within Vendor, with other companies, and with the Internet (“Access Points”), whether wired or wireless, into the Vendor network are protected by using firewalls, secure tunnels, and/or access lists on routers. vi) Vendor shall ensure that a network management system is used to monitor its local network and servers. Thresholds and alarms shall be established to notify Vendor of potential problems or outages. vii) Vendor shall implement either host-based or network-based Intrusion Detection Solution (“IDS”) or Intrusion Protection Solution (“IPS”) on any Vendor controlled network used to process, store, transmit, or access Customer Confidential Information. Appropriate response and recovery plans to monitor potential unauthorized access to said network and systems shall be implemented. viii) Vendor shall implement a Data Loss Prevention system (“DLP”) to prevent the accidental or intentional distribution of Customer Confidential Information. ix) Vendor shall secure all unused network ports.

Related to Network Controls

  • Accounting Controls The Company and its Subsidiaries maintain systems of “internal control over financial reporting” (as defined under Rules 13a-15 and 15d-15 under the Exchange Act Regulations) that comply with the requirements of the Exchange Act and have been designed by, or under the supervision of, their respective principal executive and principal financial officers, or persons performing similar functions, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with GAAP, including, but not limited to, internal accounting controls sufficient to provide reasonable assurance that (i) transactions are executed in accordance with management’s general or specific authorizations; (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with GAAP and to maintain asset accountability; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. Except as disclosed in the Registration Statement, the Pricing Disclosure Package and the Prospectus, the Company is not aware of any material weaknesses in its internal controls. The Company’s auditors and the Audit Committee of the Board of Directors of the Company have been advised of: (i) all significant deficiencies and material weaknesses in the design or operation of internal controls over financial reporting which are known to the Company’s management and that have adversely affected or are reasonably likely to adversely affect the Company’ ability to record, process, summarize and report financial information; and (ii) any fraud known to the Company’s management, whether or not material, that involves management or other employees who have a significant role in the Company’s internal controls over financial reporting.