Recursive DNS and DNS Firewall Clause Samples

Recursive DNS and DNS Firewall. Any person using Customer’s services who operates from their own IP address and Customer’s (or its affiliates) employees (or its network users) and contractors about whom data is provided to Supplier via the Supplier Services by (or at the direction of) Customer. Capitalized terms not defined in this Annex shall have the meanings as set forth in the Original Agreement. Verisign has adopted and will continue to maintain appropriate technical and organizational security measures for customer data. These measures involve Verisign infrastructure, software, employees and procedures and take into account the nature, scope and purposes of the processing as specified in the customer’s agreement. The security controls and practices are designed and intended to protect the confidentiality, integrity, and availability of customer data against the risks inherent in the processing of personal data, in particular risks from accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to customer data transmitted, stored or otherwise processed. Verisign continually works to strengthen and improve those security controls and practices. Verisign operates under practices which are aligned with the AICPA, Trust Services Principles and Criteria (System and Organization Controls (“SOC”)) (▇▇▇.▇▇▇▇▇.▇▇▇). Verisign’s information security practices establish and govern areas of security applicable to Verisign and customers’ use of Verisign’s services. Verisign personnel, including employees, contractors, and temporary employees, are subject to these practices and any additional policies that govern their employment or the services they provide to Verisign. Verisign’s approach to information security is comprehensive, implementing a multi-layered strategy where physical security, network infrastructure, software, and employee security practices and procedures all play a key role reinforced by robust governance and oversight.

Related to Recursive DNS and DNS Firewall

  • Conhecimento da Lingua O Contratado, pelo presente instrumento, declara expressamente que tem pleno conhecimento da língua inglesa e que leu, compreendeu e livremente aceitou e concordou com os termos e condições estabelecidas no Plano e no Acordo de Atribuição (“Agreement” ▇▇ ▇▇▇▇▇▇).

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.