Common use of Input Control Clause in Contracts

Input Control. Detection: Insycle designed its infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregated log data and alert appropriate employees of malicious, unintended, or anomalous activities. Insycle personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: Insycle maintains a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, Insycle will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Communication: If Insycle becomes aware of unlawful access to Customer data stored within its products, Insycle will: 1) notify the affected Customers of the incident; 2) provide a description of the steps Insycle is taking to resolve the incident; and 3) provide status updates to the Customer contact, as Insycle deems necessary. Notification(s) of incidents, if any, will be delivered to one or more of the Customer’s contacts in a form Insycle selects, which may include via email or telephone.

Appears in 2 contracts

Samples: Processing Agreement, Processing Agreement

AutoNDA by SimpleDocs

Input Control. Detection: Insycle Intentive designed its infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregated log data and alert appropriate employees of malicious, unintended, or anomalous activities. Insycle Intentive personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: Insycle Intentive maintains a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, Insycle Intentive will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Communication: If Insycle Intentive becomes aware of unlawful access to Customer data stored within its products, Insycle Intentive will: 1) notify the affected Customers of the incident; 2) provide a description of the steps Insycle Intentive is taking to resolve the incident; and 3) provide status updates to the Customer contact, as Insycle Intentive deems necessary. Notification(s) of incidents, if any, will be delivered to one or more of the Customer’s contacts in a form Insycle Intentive selects, which may include via email or telephone.

Appears in 2 contracts

Samples: www.kommunicate.io, cdn.kommunicate.io

Input Control. Detection: Insycle Keeper Security designed its infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregated log data and alert appropriate employees of malicious, unintended, or anomalous activities. Insycle Keeper Security personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: Insycle Keeper Security maintains a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, Insycle Keeper Security will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Communication: If Insycle Keeper Security becomes aware of unlawful access to Customer data stored within its products, Insycle Keeper Security will: 1) notify the affected Customers of the incident; 2) provide a description of the steps Insycle Keeper Security is taking to resolve the incident; and 3) provide status updates to the Customer contact, as Insycle Keeper Security deems necessary. Notification(s) of incidents, if any, will be delivered to one or more of the Customer’s contacts in a form Insycle Keeper Security selects, which may include via email or telephone.

Appears in 1 contract

Samples: Processing Agreement

AutoNDA by SimpleDocs

Input Control. Detection: Insycle Applozic designed its infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregated log data and alert appropriate employees of malicious, unintended, or anomalous activities. Insycle Applozic personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: Insycle Applozic maintains a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, Insycle Applozic will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Communication: If Insycle Applozic becomes aware of unlawful access to Customer data stored within its products, Insycle Applozic will: 1) notify the affected Customers of the incident; 2) provide a description of the steps Insycle Applozic is taking to resolve the incident; and 3) provide status updates to the Customer contact, as Insycle Applozic deems necessary. Notification(s) of incidents, if any, will be delivered to one or more of the Customer’s contacts in a form Insycle Applozic selects, which may include via email or telephone.

Appears in 1 contract

Samples: Applozic Data Processing Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.