Regularly Monitor and Test Networks Sample Clauses

Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning). 6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: • protecting against intrusions; • securing the computer systems and network devices; • and protecting against intrusions of operating systems or software.
Regularly Monitor and Test Networks. MUIS will use industry standard practices to protect its telecommunications systems and any computer system or network device(s) it uses to provide services hereunder to access provider systems and networks. These controls will be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: o protecting against intrusions of operating systems or software o securing the computer systems and network devices
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, internal/external vulnerability scanning). Ensure that issues identified via testing are remediated according to the issue severity (e.g. fix critical issues immediately, high severity in 15 days, etc.) 6.2 Ensure that audit trails are enabled and active for systems and applications used to access, store, process, or transmit Experian data; establish a process for linking all access to such systems and applications. Ensure that security policies and procedures are in place to review security logs on daily or weekly basis and that follow-up to exceptions is required. 6.3 Use current best practices to protect telecommunications systems and any computer system or network device(s) used to provide Services hereunder to access ACRAnet systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: • protecting against intrusions; • securing the computer systems and network devices; • and protecting against intrusions of operating systems or software.
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning.) 6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by protecting against intrusions; securing the computer systems and network devices; and protecting against intrusions of operating systems or software. ▇▇ ▇▇▇▇ ▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇ ▇▇▇▇▇ ▇▇▇ • ▇▇▇▇▇▇▇▇, ▇▇▇▇▇▇▇ ▇▇▇▇▇ • V: (▇▇▇) ▇▇▇-▇▇▇▇ F: (▇▇▇) ▇▇▇-▇▇▇▇ • ▇-▇▇▇-▇▇▇ -7934 Please type or print ALL information requested. This will aid us in processing your application for membership as quickly as possible. COMPANY NAME: DBA (If Applicable) ADDRESS: LANDLINE TELEPHONE: IN BUSINESS SINCE (mm/yy): FAX: COMPANY WEBSITE: BUSINESS LOCATION: COMMERCIAL RESIDENTIAL TYPE OF BUSINESS: □ PARTNERSHIP □ SOLE OWNER □ CORPORATION □ LLC NAME OF PARENT OR AFFILIATE COMPANY _ ADDRESS PRIMARY CONTACT: TITLE: DIRECT PHONE: EMAIL: ALTERNATE CONTACT: TITLE: DIRECT PHONE: EMAIL: PURPOSE(S) FOR WHICH CREDIT INFORMATION WILL BE USED TYPE OF BUSINESS SERVICES OFFERED/PRODUCTS SOLD ESTIMATED MONTHLY CREDIT INQUIRIES OTHER CREDIT AGENCIES USED MONTHLY BILLING TO BE SENT TO: ADDRESS: NAME AS IT APPEARS ON CARD: BILLING ADDRESS: CREDIT CARD NUMBER EXPIRATION DATE (MM/YY) Name Position SS# Home Address Previous Address I certify that I am the person named above. As a principal of I authorize Merchants Credit Bureau to review my own personal credit profile to be used only in conjunction with this application for company membership, and agree to act as a personal guarantor. I authorize the release of information on the accounts and references listed below. Signature/Title Name Position SS# Home Address Previous Address I certify that I am the person named above. As a principal of I authorize Merchants Credit Bureau to review my own personal credit profile to be used only in conjunction with this application for company membership, and agree to act as a personal guarantor. I authorize the release of information on the accounts and references listed below. Bank References: Branch Phone: Type of Account: Account Number Bank Reference: Branch Phone: Type of Account: Account Number 1. Company Name Admin. Phone ( ) Company Address 2....
Regularly Monitor and Test Networks. Per NCC’s Information Security Policy, NCC will perform regular tests on information systems (port scanning, virus scanning, internal/external vulnerability scanning). Ensure that issues identified via testing are remediated according to the issue severity (e.g. fix critical issues immediately, high severity in 15 days, etc.). Logs will be maintained for 90 days online and 1 year archived. Audit trails will be enabled and active for systems and applications used to access, store, process, or transmit Credit Bureau Data establish a process for linking all access to such systems and applications. Use current best practices to protect telecommunications systems and any computer system or network device(s) used to provide Services hereunder to access Credit Bureau systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: a. Protecting against intrusions b. Securing the computer systems and network devices c. Protecting against intrusions of operating systems or software.
Regularly Monitor and Test Networks a. Tracking and monitoring access to TMUS's network resources and Company Data. b. Regularly testing security systems and processes.
Regularly Monitor and Test Networks. 1. Track and monitor all access to network resources and cardholder data 2. Regularly test security systems and processes
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning). 6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by:  protecting against intrusions;  securing the computer systems and network devices;  and protecting against intrusions of operating systems or software. CSI, TransUnion, Equifax and/or Experian may require periodic compliance reviews. The End-User is expected to be prompt in response to these compliance reviews to avoid suspension of their access to credit information. During a compliance review, the End-User will be asked to provide documents to support two key points: 1. Consumer information was obtained for the permissible purpose indicated. 2. Consumer information was used by the company End-User indicated. The documents that may be acceptable in response to a compliance review include:  Employment Application  Signed Disclosure/Acknowledgement Form and/or Release/Authorization Form This Addendum A may be executed in any number of counterparts, each of which shall be deemed an original, but all of which taken together shall constitute one and the same instrument. A signature on a copy of this Agreement received by facsimile or electronically is binding as an original. The parties shall treat a photocopy of such facsimile as a duplicate original. The individuals signing below represent that they are duly authorized to do so and have direct knowledge of all facts certified.
Regularly Monitor and Test Networks. CLIENT understands and agrees that they must perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning). Use current best practices to protect their telecommunications systems and any computer system or network device(s) used to provide services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: ● Protecting against intrusions ● Securing the computer systems and network devices ● Protecting against intrusions of operating systems or software

Related to Regularly Monitor and Test Networks

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central ▇▇▇▇▇▇ Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.