Communications Security Clause Samples
The Communications Security clause establishes requirements and protocols to protect the confidentiality, integrity, and availability of information exchanged between parties. It typically mandates the use of secure communication channels, such as encrypted emails or secure file transfers, and may specify standards or technologies to be used for data transmission. By setting these expectations, the clause helps prevent unauthorized access, interception, or tampering with sensitive information, thereby reducing the risk of data breaches and ensuring secure collaboration.
Communications Security. C.2.9.1. The data processor shall deploy a secure Virtual Private Network (VPN) connection for its staff accessing its internal network remotely. Users shall use a two-factor authentication in order to enable the VPN connection.
C.2.9.2. The data processor shall deploy advanced firewalls to protect its network, including protection against malicious software and advanced intrusion techniques, as well as to segment its network to ensure resilience.
C.2.9.3. The data processor shall deploy solutions designed to monitor and log the activity on its network. The logs shall be continuously monitored to timely identify and remedy security incidents and shall be retained in accordance with the data processor’s formal policies and procedures.
C.2.9.4. The data processor shall synchronize system clocks on network servers to a universal time source (e.g. UTC) or network time protocol (NTP).
Communications Security. 8.1. Network security management
Communications Security. 9.1 Leading Resolutions shall ensure that all external connections to the Supplier Systems (including, without limitation, networks or remote access) and shall be individually identified, verified, recorded, and approved by Leading Resolutions.
9.2 Leading Resolutions shall ensure that wireless access to the Supplier Systems is subject to authentication authorisation, and encryption protocols in line with Good Industry Practice and shall only be permitted from locations approved by Leading Resolutions.
Communications Security. Networks are managed and controlled to protect information and groups of information services are segregated on networks. Communication with applications utilised cryptographic controls such as TLS to protect the information in transit over public networks. Stateful firewalls, web application firewalls, and DDoS protection are used to prevent attacks.
Communications Security. Comcast shall put data transfer policies and procedures in place to protect Company PI that is transferred electronically.
Communications Security. (a) Firewalls: Ring Central deploys reasonably appropriate firewall technology in operation of the Services. .
Communications Security system acquisition, development, maintenance, including policies on vulnerability handling and disclosure.
Communications Security. Network Security
i. Silverfin logically segregates Customer data within a shared service environment.
ii. Silverfin secures network segments from external entry points where Customer data is accessible.
iii. External network perimeters are hardened and configured to prevent unauthorized traffic.
iv. Inbound and outbound points are protected by firewalls and intrusion detection systems (IDS). c. Ports and protocols are limited to those with specific business purpose.
v. Silverfin synchronizes system clocks on network servers to a universal time source (e.g. UTC) or network time protocol (NTP).
vi. Customer data, including personal data, is encrypted at rest.
vii. Silverfin encrypts data during transmission between each application tier and between interfacing applications.
Communications Security. The Partner shall maintain and implement effective controls to ensure protection of information networks and its supporting IT assets, and to maintain the end-to-end security of information transferred within and outside of its organisation.
Communications Security. The Data Processor must maintain network security using commercially available equipment and industry standard techniques, including firewalls and intrusion detection systems. The infrastructure must be segmented to at least separate production systems from test and development environments. All personal data transmitted by the Data Processor must be encrypted while in transit. dele
