Common use of Build and Maintain a Secure Network Clause in Contracts

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point.

Appears in 6 contracts

Sources: Mortgage Agreement, Customer Subscriber's Service Agreement, Customer Subscriber's Service Agreement

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services services, and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point. systems (port scanning, virus scanning, vulnerability scanning).

Appears in 6 contracts

Sources: Service Agreement, Service Agreement, Service Agreement

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls and servers must be performed through a secure asecure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused portsunusedports, services and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point.

Appears in 1 contract

Sources: Service Agreement

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services services, and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point.

Appears in 1 contract

Sources: Landlord Subscriber Agreement

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses addresses on Wireless wireless access points and restrict authentication on the configuration of the access point.

Appears in 1 contract

Sources: Credit Report Agreement

Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. 5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. 5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only. 5.4 Any stand alone computers that directly access the Internet must have a desktop desktop. Firewall deployed that is installed and configured to block unnecessary/unused ports, services and network traffic. 5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. 5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point.

Appears in 1 contract

Sources: Subscriber Agreement