Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning). 6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: • protecting against intrusions; • securing the computer systems and network devices; • and protecting against intrusions of operating systems or software.
Appears in 6 contracts
Sources: Mortgage Agreement, Customer Subscriber's Service Agreement, Customer Subscriber's Service Agreement
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning).
6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: • protecting against intrusions; • securing the computer systems and network devices; • and protecting against intrusions of operating systems or software.
Appears in 1 contract
Sources: Membership Agreement
Regularly Monitor and Test Networks. 6.1 (A) Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning).
6.2 (B) Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency Alliance 2020, Inc. systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: • protecting against intrusions; • securing the computer systems and network devices; • and protecting against intrusions of operating systems or software.
Appears in 1 contract
Sources: Master Service Agreement
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanningvirusscanning, vulnerability scanning).
6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: • protecting against intrusions; • securing the computer systems and network devices; • and protecting against intrusions of operating systems or software.
Appears in 1 contract
Sources: Service Agreement
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning.).
6.2 Use current best practices to protect your telecommunications systems and any computer system or network device(s) you use to provide Services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: • by protecting against intrusions; • securing the computer systems and network devices; • and protecting against intrusions of operating systems or software.
Appears in 1 contract
Sources: Service Agreement