Network Isolation Clause Samples

Network Isolation. If Illumina hosts applications which store or process Customer Data: 1. Network segments containing Internet-accessible services shall be isolated from internal networks. 2. Network segments where Customer Data resides shall be physically or logically isolated from segments containing other data. 3. Network segments shall be protected by a firewall. A change control system shall be in place for changes made to firewall rule sets or other network infrastructure such as routers and switches.
Network Isolation. Where remote access is enabled, Contractor shall provide support for the potential isolation of Company IT/OT Technology from Contractor’s networks or systems. Contactor shall provide all technical information necessary to facilitate the failsafe and effective construction of appropriate firewall rules, including full disclosure of which hosts need to communicate through each firewall interface and what protocols and ports those hosts utilize.
Network Isolation. The entire network infrastructure of the solution shall be isolated, this includes any wired server/kiosk involved that needs to be installed at the facility.

Related to Network Isolation

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.