System and Network Security Clause Samples

The System and Network Security clause establishes requirements and responsibilities for maintaining the security of information systems and networks involved in the agreement. It typically outlines measures such as implementing firewalls, encryption, access controls, and regular security audits to protect against unauthorized access, data breaches, or cyberattacks. This clause serves to safeguard sensitive data, ensure compliance with relevant regulations, and allocate responsibility for security incidents, thereby reducing the risk of security breaches and protecting both parties' interests.
POPULAR SAMPLE Copied 1 times
System and Network Security. Violations of system or network security are prohibited, and may result in criminal and civil liability. Reliance Connects will investigate incidents involving such violations and may involve and will cooperate with law enforcement if a criminal violation is suspected. Examples of system or network security violations include, without limitation, the following: • Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network. • Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. • Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks. • Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting.
System and Network Security. 5.8.1 Violations of system or network security are prohibited and may result in criminal and civil liability. Examples include, but are not limited to the following: 5.8.1.1 unauthorized access, use, probe, or scan of a systems security or authentication measures, data or traffic; 5.8.1.2 interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; 5.8.1.3 forging of any TCP-IP packet header or any part of the header information in an e- mail or a newsgroup posting; and 5.8.1.4 employing posts or programs which consume excessive CPU time or storage space, permits the use of mail services, mail forwarding capabilities, POP accounts, or auto responders other than for their own account; or resale of access to CGI scripts installed on our servers.
System and Network Security. 3.1. Any reference to systems and networks under this section refer to all systems and networks to which the Customer is granted access through Userverse, including, but not limited to, the Network and the Internet. 3.2. The Customer may not circumvent user authentication or security of any host, device, network or account (referred to as “hacking” or “cracking”), nor interfere with service to any user, host, device or network (referred to as “denial of service attacks”). The host, device, network or account shall also not be used for any illegal purpose, including phishing. 3.3. Violations of system or network security by the Customer are prohibited and may result in civil or criminal liability. Userverse will investigate incidents involving any violation or suspected violation and shall involve and co-operate with law enforcement officials if a criminal violation is suspected. Examples of system or network security violations include, without limitation, thefollowing: 3.3.1. Unauthorised access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of any system or network or to breach any security or authentication measures without the express authorisation of Userverse. 3.3.2. Unauthorised monitoring of data or traffic on the network or systems without the express authorisation of Userverse. 3.3.3. Interference with service to any user, device, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; and/or 3.3.4. Forging of any TCP-IP packet header (spoofing) or any part of the header information in an e- mail or a newsgroup posting.
System and Network Security. The Company understands that there is a constant risk posed to its computer systems and networks by individuals attempting to gain unauthorized access. Daily, computer systems run the risk of compromise through unauthorized access by hackers, malware, and other threats that not only put the Company’s own data and employees at risk but could also potentially compromise the Company financial information and accounts. Financial losses resulting from such risk could cause the failure of the Company’s business. The Company explicitly acknowledges that the Bank is not responsible for the safety and security of the Company’s systems and networks. The Company understands that its computer systems are vulnerable to various types of infiltration. The Company will take responsible measures to protect its data by ensuring that proper security network devices are deployed, configured properly, and kept up to date with tools such as firewalls, proxies, intrusion detection and prevention systems, up-to-date anti-virus protection, operating system patches, and patches for third-party software packages like Adobe Acrobat, Internet Explorer, and Microsoft Office. Additionally, security audits should be performed by the Company to ensure that the security measures it has in place are adequate and effective.
System and Network Security. The Customer is required to protect the security of its internet accounts (e.g. ftp, email, etc.) and usage to ensure the security of the MacStadium network and every MacStadium network object, including without limitation, routers, switches and workstations. Further, the Customer is responsible for validating the integrity of the information and data it receives or transmits over the internet and reporting any weaknesses in the MacStadium network and any incidents of possible misuse or violation of this AUP. To ensure the integrity of our network, the following activities are strictly prohibited: a) Using or distributing tools designed to compromise security, b) unauthorized monitoring of data or traffic on the MacStadium network or any other network without express authorization, deliberate attempts to overload the MacStadium network and broadcast attacks, and c) forging of any TCP-IP packet header or any part of the header information in an email or intentionally or negligently transmitting files containing a computer virus or corrupted data.
System and Network Security. End Users are prohibited from violating any system or network security measures including but not limited to engaging in unauthorized access or use of ▇▇▇▇’▇ or a third party’s network, data or information. End Users are unauthorized to monitor Bell or third party’s data, systems or network traffic. End Users are prohibited to interfere with service to any user, host or network including without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks. End Users are prohibited to forge any TCP-IP packet header or any part of the header information in an e-mail or newsgroup posting.
System and Network Security. Customer is prohibited from utilizing Peer 1 services to compromise the security or tamper with system resources or accounts on computers at the Premises or at any third party site. Specific activities that are prohibited include, but are not limited to: · Use or distribution of tools designed for compromising security. · Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network. · Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. · Deliberate attempts to overload a system and broadcast attacks. · Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. · Intentionally or negligently transmitting files containing a computer virus or corrupted data.
System and Network Security. 7.1 You must not, and must not allow any other person to, interfere with the security of our systems, networks, software or infrastructure, including by: (a) accessing data unlawfully or without consent; (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures; (c) attempting to interfere with service to any user, host or network, including, without limitation, via means of overloading, "flooding", "mail bombing" or "crashing"; (d) forging any TCP/IP packet header or any part of the header information in any e-mail or newsgroup posting; or (e) taking any action in order to obtain services to which you or the other person are not entitled. 7.2 Without limiting any of our other rights to suspend the Service, we may immediately and without notice suspend the Service if a breach of security of your equipment results in malicious network activity originating from you.
System and Network Security. In order to protect the security and integrity of the Site or the Service, you may not (and you agree that you will not):
System and Network Security. Maintain network access restrictions, firewalls, server hardening measures, and user authentication protocols designed to protect the security of Personal Data.