EXTERNAL SECURITY Sample Clauses
EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No
EXTERNAL SECURITY. Pear Deck service is hosted and protected by Google Cloud Computing
EXTERNAL SECURITY. We use industry-standard Secure Sockets Layer (SSL) encryption software to help protect your information from loss, theft, misuse, unauthorized access, disclosure, alteration, and destruction. All user data is hosted by ▇▇▇▇▇▇, a Salesforce company; ObjectRocket, a Rackspace company; and Amazon Web Services. Heroku, ObjectRocket, and Amazon Web Services use SSL encryption software. These third parties are well-known, established providers, who are bound to practice adequate security measures and to use your information solely as it pertains to the provision of their services.
EXTERNAL SECURITY. We have strict security measures in place to try to protect your information and make sure that it is not lost, damaged or accessed by anyone who should not see it. Your data is transmitted securely over SSL and stored in Google Cloud. To learn more about Google Cloud’s security measures, please visit ▇▇▇▇▇://▇▇▇▇▇.▇▇▇▇▇▇.▇▇▇/security. Additionally, we conduct regular security audits on these services and access to this data is restricted to only authorized employees of Screencastify with suitable training and background checks. In the unlikely event of an unauthorized disclosure of your data we will notify you by email and, when
EXTERNAL SECURITY. All IOP systems have installed firewalls, password protected servers and antivirus softwa
EXTERNAL SECURITY. Data Security. The Service Provider agrees to abide by and maintain adequate data security measures, consistent with industry standards and technology best practices, to protect Student Data from unauthorized disclosure or acquisition by an unauthorized person.
EXTERNAL SECURITY. Carnegie Learning has implemented an information security program with numerous measures, including administrative, technical and physical controls that are designed to reasonably safeguard information that can individually identify you against the loss, misuse and alteration of the information under our control. Physical security of Carnegie Learning production systems and data including any such data is provided by AWS . Our offices and staff are in a class A office building secured by RFID badges and security guards, 24/7
EXTERNAL SECURITY. Section 1.1: School passwords are not distributed by Canyon Creek Software. Teacher passwords may be emailed to teachers if they submit a forgotten password request. Administration passwords are distributed via an Egnyte secure portal document.
EXTERNAL SECURITY. Software Security Critical Freckle applications undergo regular vulnerability assessments on the running ap
EXTERNAL SECURITY. Amplify maintains a comprehensive security program, as described in the attached security statement. Sections 4 (Application Security by Design), 5 (Proactive Security), and 6 (Reactive Security) are all directly relevant to external security. Amplify undergoes annual third party security examinations, including SOC 2 Type 2 examination. Examination results are available upon request.
