Common use of Platform Security Clause in Contracts

Platform Security. Secure Sockets Layer (SSL) is the standard security technology for creating an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browser remains private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers. WE employs SSL to protect all data transmitted between browser and web server. This technology protects confidential information (e.g., passwords, bid data, customer data) from being viewed or tampered with by unauthorized parties thus ensuring the integrity of our auction events. WORLD ENERGY SOLUTIONS PROPRIETORY INFORMATION WORLD ENERGY SOLUTIONS (GRAPHIC) FIGURE 11: WORLD ENERGY'S SSL CERTIFICATE SSL works by using a public key to encrypt data that's transferred over the SSL connection. WE utilizes strong encryption also known as 128-bit encryption. 128-bit encryption provides a significantly greater amount of cryptographic protection than 40-bit encryption. In order to be able to generate an SSL link, a web server requires an SSL Certificate. WE's platform utilizes Comodo's SSL Certificate and is depicted in Figure 11. To provide maximum uptime system availability, WE's platform is hosted in a multi-tiered, highly secure, highly reliable fault tolerant environment. This environment includes a universal power supply (UPS) and diesel generator for fully redundant backup power to computer equipment. The environment also includes climate control as well as physical security to building and data center. To provide highest level of availability to the internet, the data center utilizes connections to multiple Tier 1 internet backbone providers. To minimize risk of server downtime due to hard-drive failure, our platform server features a hot swappable RAID 1 disk array. In the event of major system component failure such as the motherboard, a spare server is readily available and can be brought online. To minimize risk of interruption due to outside attacks on our platform, we employ a fully integrated security approach located at the network edge. Using deep packet inspection engines, which are currently capable of recognizing 1800+ attack and vulnerabilities signatures, we are able to defend network resources from Trojans, worms, DoS/DDos attacks, and blended threats including sophisticated polymorphic attacks. Our backup cycle includes nightly incremental backups and a weekly image backup. The nightly backups are on a fourteen day rotation and the weekly backup is kept on a two-week rotation. Each backup, whether it be nightly or weekly, is stored in an off site location.

Appears in 2 contracts

Sources: Contract (World Energy Solutions, Inc.), Contract for Electricity Supply Acquisition Management Services (World Energy Solutions, Inc.)