Common use of Preventing Unauthorized Product Use Clause in Contracts

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules.

Appears in 2 contracts

Sources: Master Saas Agreement, Saas Agreement

Preventing Unauthorized Product Use. We implement Company implements industry standard access controls and detection capabilities for the internal networks that support its products. Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers Static code analysis: Security reviews of code stored in Company’s source code repositories is performed, checking for coding best practices and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rulesidentifiable software flaws.

Appears in 2 contracts

Sources: Data Processing Agreement, Data Processing Agreement

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Penetration testing: We perform an annual penetration test. The intent of the penetration tests is to identify and resolve foreseeable attack vectors and potential abuse scenarios.

Appears in 1 contract

Sources: Data Processing Addendum