Network and Systems Clause Samples
The 'Network and Systems' clause defines the responsibilities and requirements related to the use, maintenance, and security of computer networks and IT systems within an agreement. It typically outlines standards for system performance, data protection, and access controls, and may specify obligations for both parties to prevent unauthorized access or disruptions. This clause ensures that both parties maintain secure and reliable technological infrastructure, thereby minimizing risks of data breaches, downtime, or operational failures.
Network and Systems. The policy referred to above forms part of this Agreement. The acceptable use conditions apply to the use of the device, school network and internet while on school premises, and at any time the student is using their school account to access various services (email, OneDrive, etc.). Communication through internet and online communication services must also comply with school rules and policies, which are available on the school website. While on the school network, students should not: • Create, access or circulate files or other content that attempts to undermine, hack into and/or bypass the hardware and/or software security mechanisms that are in place. • Disable settings for virus protection, spam and/or internet filtering that have been applied by the Department. • Use unauthorised programs or intentionally download unlicensed media/content/software. • Intentionally damage or disable computers, computer systems, printers, network devices, the school or government networks. • Use the device for unauthorised commercial activities, lobbying, gambling or any unlawful purpose. Note: Students’ use of internet and online communication services, associated with their school account, may be audited at the request of appropriate authorities for investigative purposes surrounding inappropriate use. Use of the school's ICT network is secured with a user name and password. The password must be difficult enough so as not to be guessed by other users and is to be kept private by the student and not divulged to other individuals (e.g. a student should not share their username and password with other students). IT Technicians may require your password to perform maintenance and repairs. The password should be changed regularly, as well as when prompted by the department or when it may have become known by another person. School network account credentials are not to be shared. Students should not allow others to use their account for any reason. Students are responsible for all actions taken using their account credentials. Students should log off, or lock their screen, at the end of each session to ensure no one else can use their account or device. If available, students should also set an extra level of password protection for access to their BYOD device. This could be in the form of a boot-up password or other lock screen. Parents/caregivers may also choose to maintain an administrator account on a personally-owned device for access to the device in the event thei...
Network and Systems. The policy referred to above forms part of this Agreement. The acceptable use conditions apply to the use of the device, school network and internet while on school premises, and at any time the student is using their school account to access various services (email, OneDrive, etc.). Communication through internet and online communication services must also comply with school rules and policies, which are available on the school website. While on the school network, students should not: • Create, access or circulate files or other content that attempts to undermine, hack into and/or bypass the hardware and/or software security mechanisms that are in place. • Disable settings for virus protection, spam and/or internet filtering that have been applied by the Department. • Use unauthorised programs or intentionally download unlicensed media/content/software. • Intentionally damage or disable computers, computer systems, printers, network devices, the school or government networks. • Use the device for unauthorised commercial activities, lobbying, gambling or any unlawful purpose. Note: Students’ use of internet and online communication services, associated with their school account, may be audited at the request of appropriate authorities for investigative purposes surrounding inappropriate use.
Network and Systems a) All network components, servers and purchased and custom applications that are part of the payment card system must conform to all current PCI-DSS requirements. For more information, visit ▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇. An outline of the primary principles and requirements follows. Refer to the PCI-DSS (located online at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇) for the detailed elements of each.
i. Building and maintaining a secure network
1. Install and maintain a firewall configuration to protect data
2. Do not use vendor supplied defaults for system passwords and other security parameters 2. Encrypt transmission of cardholder data and sensitive information across public networks.
iii. Maintaining a Vulnerability Management Program
1. Use and regularly updated anti-virus software
2. Develop and maintain secure systems and applications.
iv. Implementing Strong Access Control Measures
1. Restrict access to data by business need to know
2. Assign an unique ID to each person with computer access
3. Restrict physical access to cardholder data
v. Regularly Monitoring and Testing Networks
1. Track and monitor all access to network resources and cardholder data
2. Regularly test security systems and processes
vi. Maintain a Department Information Security Departmental Policy that addresses information security standards which follows and meets all University Information Security Standards and PCI-DSS requirements.
