Access, Intervention, Transfer and Separation Control Sample Clauses

Access, Intervention, Transfer and Separation Control. 5.1 Documented security architecture of networks managed by or on behalf of Acoustic in its operation of the SaaS Product will be maintained. Such network architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, will be reviewed for compliance with secure segmentation, isolation, and defense-in-depth standards prior to implementation. SaaS Product networks do not use wireless-networking technology. Wireless-networking technology may be used in the maintenance and support of the SaaS Product and associated Components. Such wireless networks, if any, will be encrypted, will require secure authentication, and will not provide direct access to SaaS Product networks.
AutoNDA by SimpleDocs
Access, Intervention, Transfer and Separation Control. (a) U-Visit will maintain documented security architecture of networks managed by U-Visit in its operation of the Service. U-Visit will separately review such network architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, for compliance with its secure segmentation, isolation, and defense in depth standards prior to implementation. U-Visit may use wireless networking technology in its maintenance and support of the Service and associated components. Such wireless networks, if any, will be encrypted and require secure authentication and will not provide direct access to Service networks. Service networks do not use wireless networking technology.
Access, Intervention, Transfer and Separation Control. (a) Pindrop will maintain measures for Pindrop-Controlled Systems that are designed to logically separate and prevent Company’s Confidential Information stored within Pindrop-Controlled Systems from being exposed to or accessed by unauthorized persons. Pindrop will maintain isolation of its production and non-production environments, and, if Company’s Confidential Information is transferred to a non- production environment, for example to reproduce an error at Company’s request, security and privacy protections in the non-production environment will be equivalent to those in production.
Access, Intervention, Transfer and Separation Control a. Cellulant will maintain documented security architecture of networks that it manages in its operation of the Contracted Services. Cellulant will employ measures to prevent unauthorized network connections to systems, applications, and network devices, ensuring compliance with secure segmentation, isolation, and defense in-depth standards. Cellulant may use wireless networking technology in its delivery of the Contracted Services, but Cellulant must encrypt and require secure authentication for any such wireless networks.
Access, Intervention, Transfer and Separation Control a. IBM will maintain a documented security architecture for Components. IBM will separately review such security architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, for compliance with its secure segmentation, isolation, and defense-in-depth standards prior to implementation.
Access, Intervention, Transfer and Separation Control a. The Supplier will maintain a documented security architecture for Components. The Supplier will separately review such security architecture, including measures designed to prevent unauthorized network connections to systems, applications and network devices, for compliance with its secure segmentation, isolation, and defense-in-depth standards prior to implementation.
Access, Intervention, Transfer and Separation Control a. Supplier will maintain documented security architecture of networks that it manages in its operation of the Contracted Services. Supplier will employ measures to prevent unauthorized network connections to systems, applications, and network devices, ensuring compliance with secure segmentation, isolation, and defense in-depth standards. Supplier may use wireless networking technology in its delivery of the Contracted Services, but Supplier must encrypt and require secure authentication for any such wireless networks.
AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.