Network Security Sample Clauses

Network Security. 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.
AutoNDA by SimpleDocs
Network Security. The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.
Network Security. Contractor agrees at all times to maintain network security that - at a minimum - includes: network firewall provisioning, intrusion detection, and regular third party penetration testing. Contractor also agrees to maintain network security that conforms to one of the following:
Network Security. Seller and Purchaser understand and agree that the State of Mississippi’s Enterprise Security Policy mandates that all remote access to and/or from the State network must be accomplished via a Virtual Private Network (VPN). If remote access is required at any time during the life of this Agreement, Seller and Purchaser agree to implement/maintain a VPN for this connectivity. This required VPN must be IPSec-capable (ESP tunnel mode) and will terminate on a Cisco VPN-capable device ( i.e. VPN concentrator, PIX firewall, etc.) on the State’s premises. Seller agrees that it must, at its expense, implement/maintain a compatible hardware/software solution to terminate the specified VPN on the Seller’s premises. The parties further understand and agree that the State protocol standard and architecture are based on industry-standard security protocols and manufacturer engaged at the time of contract execution. The State reserves the right to introduce a new protocol and architecture standard and require the Seller to comply with same, in the event the industry introduces a more secure, robust protocol to replace IPSec/ESP and/or there is a change in the manufacturer engaged.
Network Security. Network security is a wide security domain that is addressed at multiple levels, some of which are:
Network Security. AWS provides a strong foundation of security and compliance which we supplement by employing industry standard network security controls designed to protect Customer Data, including, but not limited to, the following:
Network Security. Supplier agrees at all times to maintain network security that, at a minimum, includes: network firewall provisioning, intrusion detection, and regular (at least annual) third party vulnerability assessments. Likewise, Supplier agrees to maintain network security that conforms to generally recognized industry standards (as described in Section C.5) and best practices that Supplier then applies to its own network.
AutoNDA by SimpleDocs
Network Security. Customer acknowledges that a third-party is used by Tyler Technologies to process IVR Data. Customer’s content will pass through and be stored on the third-party servers and will not be segregated or in a separate physical location from servers on which other customers’ content is or will be transmitted or stored.
Network Security. A high-level network diagram of the network is maintained and reviewed on a yearly basis. The network diagram provides a high level overview of the cardholder data environment (CDE), which at a minimum shows the connections in and out of the CDE. Critical system components within the CDE, such as POS devices, databases, web servers, etc., and any other necessary payment components, as applicable should also be illustrated. In addition, ASV should be performed and completed by a PCI SSC Approved Scanning Vendor, where applicable. Evidence of these scans should be maintained for a period of 18 months.
Network Security. Medallia shall use industry standard firewall and encryption technologies to protect the public gateways through which Customer data travels. Medallia will use commercially reasonable efforts for protection against and detection of common network attacks. Medallia will monitor its network for attacks and will deploy appropriate processes to manage vulnerabilities.
Time is Money Join Law Insider Premium to draft better contracts faster.