EXTERNAL SECURITY Sample Clauses

EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No
AutoNDA by SimpleDocs
EXTERNAL SECURITY. Pear Deck service is hosted and protected by Google Cloud Computing
EXTERNAL SECURITY. We use industry-standard Secure Sockets Layer (SSL) encryption software to help protect your information from loss, theft, misuse, unauthorized access, disclosure, alteration, and destruction. All user data is hosted by Xxxxxx, a Salesforce company; ObjectRocket, a Rackspace company; and Amazon Web Services. Heroku, ObjectRocket, and Amazon Web Services use SSL encryption software. These third parties are well-known, established providers, who are bound to practice adequate security measures and to use your information solely as it pertains to the provision of their services.
EXTERNAL SECURITY. Data Security. The Service Provider agrees to abide by and maintain adequate data security measures, consistent with industry standards and technology best practices, to protect Student Data from unauthorized disclosure or acquisition by an unauthorized person.
EXTERNAL SECURITY. Carnegie Learning has implemented an information security program with numerous measures, including administrative, technical and physical controls that are designed to reasonably safeguard information that can individually identify you against the loss, misuse and alteration of the information under our control. Physical security of Carnegie Learning production systems and data including any such data is provided by AWS . Our offices and staff are in a class A office building secured by RFID badges and security guards, 24/7
EXTERNAL SECURITY. All data collected through the Service is stored and processed in the United States. Our service is hosted on the Microsoft Azure cloud platform, which provides DDoS protection, NAT endpoints, and monitoring capabilities. Databases are located behind firewalls that require user/password credentials and pre- authorized IP-addresses
EXTERNAL SECURITY. Section 1.1: School passwords are not distributed by Canyon Creek Software. Teacher passwords may be emailed to teachers if they submit a forgotten password request. Administration passwords are distributed via an Egnyte secure portal document.
AutoNDA by SimpleDocs
EXTERNAL SECURITY. Thrively’s external security environment includes SPI firewalls and TLS/SSL encryption.
EXTERNAL SECURITY. ParentSquare’s physical infrastructure is hosted and managed within Amazon’s secure data centers and utilize the Amazon Web Service (AWS) technology. AWS’ highly secure data centers have been accredited under: SOC 1/SSAE 16/ISAE 3402, SOC 2 (formerly SAS70), PCI Level 1, ISO 27001, and FISMA. ParentSquare uses AWS security best practices such as virtual private cloud, firewalls, and recommended intrusion detection. We have described our approach to External Security in an attachment to this document.
EXTERNAL SECURITY. We have strict security measures in place to try to protect your information and make sure that it is not lost, damaged or accessed by anyone who should not see it. Your data is transmitted securely over SSL and stored in Google Cloud. To learn more about Google Cloud’s security measures, please visit xxxxx://xxxxx.xxxxxx.xxx/security. Additionally, we conduct regular security audits on these services and access to this data is restricted to only authorized employees of Screencastify with suitable training and background checks. In the unlikely event of an unauthorized disclosure of your data we will notify you by email and, when
Time is Money Join Law Insider Premium to draft better contracts faster.