Email Security (EMS Sample Clauses

Email Security (EMS. EMS from Censornet is a 100% cloud-based service that analyzes email traffic and removes unwanted or malicious messages. The service scans all inbound (and outbound) messages for threats including malware and phishing attacks, and examines URLs embedded in messages protecting users from inappropriate or malicious web pages. Organisations route email through Censornet’s Cloud by changing their MX record. We use world-class, highly accredited providers to deliver EMS that include Amazon, IBM and Microsoft. In Europe specific data centre locations include Frankfurt, Dublin and Amsterdam. Organizations choose which data centre or centres process their mail. In the UK data centre locations include London. In the US data centre locations include Wyoming, Texas and Virginia. In the UAE data centre locations include Dubai. Email messages flow through the infrastructure within the selected data centre(s) above and are checked for spam and viruses and other content. If the message is ‘clean’ it is logged and delivered to the customer’s email server. The conversation with the customer’s email server is also logged. Log information includes IP addresses, To, From and Subject fields, server responses, and other metadata, but does not include the message body or any file attachments. Log data is stored in the same data centre that processes email traffic. Some log data may be replicated for reporting and visualization. The ‘home’ region selected at the time of account provisioning determines the location of this data. During processing the message is written to disk. Once delivered to the customer’s email server it is immediately deleted. This typically takes no more than a few seconds. If a message is determined to be spam then the message may optionally be written to a quarantine where it is stored for thirty (30) days. Organization’s may choose to delete spam rather than quarantine it. The quarantine is located specifically in the following data centres: Amsterdam (for UK and EU customers), Dallas TX (for US customers) and Dubai (for UAE customers).
AutoNDA by SimpleDocs
Email Security (EMS. EMS from Censornet is a 100% cloud-based service that analyzes email traffic and removes unwanted or malicious messages. The service scans all inbound (and outbound) messages for threats including malware and phishing attacks, and examines URLs embedded in messages protecting users from inappropriate or malicious web pages. Organisations route email through Censornet’s Cloud by changing their MX record. Certain EMS features use API integration with Microsoft Exchange Online via the MS Graph API and appropriate access must be granted explicitly to use these features (e.g. Post Deliver Deletion of previously delivered messages). The Censornet email solution is an Integrated Cloud Email Security (ICES) solution. We use world-class, highly accredited providers to deliver EMS that include Amazon, IBM and Microsoft. In Europe specific data centre locations include Frankfurt, Dublin and Amsterdam. Organizations choose which data centre or centres process their mail. In the UK data centre locations include London. In the US data centre locations include Wyoming, Texas and Virginia. In the UAE data centre locations include Dubai. In India data centre locations include Pune. Email messages flow through the infrastructure within the selected data centre(s) above and are checked for spam and viruses and other content. If the message is ‘clean’ it is logged and delivered to the customer’s email server. The conversation with the customer’s email server is also logged. Log information includes IP addresses, To, From and Subject fields, server responses, and other metadata, but does not include the message body or any file attachments. Log data is stored in the ‘home’ region selected at the time of account provisioning. Some log data may be replicated for optimisation, reporting and visualization purposes in the same data centre that processes email traffic. During processing the message is written to disk. Once successfully delivered to the customer’s email server it is immediately deleted. This typically takes no more than a few seconds. If a message is determined to be spam then the message may optionally be written to a quarantine where it is stored for thirty (30) days. Organization’s may choose to delete spam rather than quarantine it. The quarantine is located specifically in the following data centres: Amsterdam (for UK and EU customers) Dallas TX (for US customers), Dubai (for UAE customers) and Pune (for India).

Related to Email Security (EMS

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Electronic PHI Security Rule Obligations 5.1 With respect to Electronic PHI, Business Associate shall:

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Financial Security Arrangements At least 20 Business Days prior to the commencement of the design, procurement, installation, or construction of a discrete portion of the Connecting Transmission Owner’s Interconnection Facilities and Upgrades, the Interconnection Customer shall provide the Connecting Transmission Owner, at the Interconnection Customer’s option, a guarantee, a surety bond, letter of credit or other form of security that is reasonably acceptable to the Connecting Transmission Owner and is consistent with the Uniform Commercial Code of the jurisdiction where the Point of Interconnection is located. Such security for payment shall be in an amount sufficient to cover the costs for constructing, designing, procuring, and installing the applicable portion of the Connecting Transmission Owner’s Interconnection Facilities and Upgrades and shall be reduced on a dollar-for-dollar basis for payments made to the Connecting Transmission Owner under this Agreement during its term. The Connecting Transmission Owner may draw on any such security to the extent that the Interconnection Customer fails to make any payments due under this Agreement. In addition:

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Learning Services and are incorporated herein by reference.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

Time is Money Join Law Insider Premium to draft better contracts faster.