Common use of Communications and Operations Management Clause in Contracts

Communications and Operations Management. The IT organization manages changes to the corporate infrastructure, systems and applications through a centralized change management program, which may include, testing, business impact analysis and management approval, where appropriate. Incident response procedures exist for security and data protection incidents, which may include incident analysis, containment, response, remediation, reporting and the return to normal operations. To protect against malicious use of assets and malicious software, additional controls may be implemented, based on risk. Such controls may include, but are not limited to, information security practices and standards; restricted access; designated development and test environments; virus detection on servers, desktops and notebooks; virus email attachment scanning; system compliance scans; intrusion prevention monitoring and response; logging and alerting on key events; information handling procedures based on data type, e-commerce application and network security; and system and application vulnerability scanning.

Appears in 4 contracts

Samples: i.dell.com, i.dell.com, i.dell.com

AutoNDA by SimpleDocs

Communications and Operations Management. The IT organization manages changes to the corporate infrastructure, systems and applications through a centralized change management program, which may include, testing, business impact analysis and management approval, approval where appropriate. Incident response procedures exist for security and data protection incidents, which may include incident analysis, containment, response, remediation, reporting and the return to normal operations. To protect against malicious use of assets and malicious software, additional controls may be implemented, implemented based on risk. Such controls may include, but are not limited to, information security practices policies and standards; , restricted access; , designated development and test environments; , virus detection on servers, desktops desktop and notebooks; virus email attachment scanning; system compliance scans; , intrusion prevention monitoring and response; , logging and alerting on key events; , information handling procedures based on data type, e-commerce application and network security; , and system and application vulnerability scanning.

Appears in 2 contracts

Samples: Customer Master Services Agreement, Secureworks Master Services Agreement – Germany

Communications and Operations Management. The IT organization manages changes to the corporate infrastructure, systems and applications through a centralized change management program, which may include, testing, business impact analysis and management approval, approval where appropriate. Incident response procedures exist for security and data protection incidents, which may include incident analysis, containment, response, remediation, reporting and the return to normal operations. To protect against malicious use of assets and malicious software, additional controls may be implemented, implemented based on risk. Such controls may include, but are not limited to, information security practices policies and standards; , restricted access; , designated development and test environments; , virus detection on servers, desktops desktop and notebooks; virus email attachment scanning; system compliance scans; , intrusion prevention monitoring and response; , logging and alerting on key events; , information handling procedures based on data type, e-e- commerce application and network security; , and system and application vulnerability scanning.

Appears in 1 contract

Samples: Secureworks Master Services Agreement – Switzerland

AutoNDA by SimpleDocs

Communications and Operations Management. The IT organization manages changes to the corporate infrastructure, systems and applications through a centralized change management program, program which may include, include testing, business impact analysis and management approval, approval where appropriate. Incident response procedures exist for security and data protection incidents, incidents which may include incident analysis, containment, response, remediation, reporting and the return to normal operations. To protect against malicious use of assets and malicious software, additional controls may be implemented, implemented based on risk. Such controls may include, but are not limited to, information security practices policies and standards; , restricted access; , designated development and test environments; , virus detection on servers, desktops desktop and notebooks; virus email attachment scanning; system compliance scans; , intrusion prevention monitoring and response; , logging and alerting on key events; , information handling procedures based on data type, e-commerce application and network security; , and system and application vulnerability scanning.

Appears in 1 contract

Samples: Global Partner Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.