Common use of Network Monitoring Clause in Contracts

Network Monitoring. All network systems and servers are monitored 24/7/365. Innovative will monitor its systems for security breaches, violations and suspicious (questionable) activity. This includes suspicious external activity (including, without limitation, unauthorized probes, scans or break-in attempts) and suspicious internal activity (including, without limitation, unauthorized system administrator access, unauthorized changes to its system or network, system or network misuse or program information theft or mishandling). Innovative will notify Client as soon as reasonably possible of any known security breaches or suspicious activities involving Client’s production data or environment, including, without limitation, unauthorized access and service attacks, e.g., denial of service attacks.

Appears in 3 contracts

Sources: Subscription License Agreement, Subscription License Agreement, Perpetual License Agreement