Network security management Sample Clauses

Network security management. Networks and network services are secured, for example by separation and segregation.
AutoNDA by SimpleDocs
Network security management. DoIT staff routinely become aware of advanced persistent threats (APTs), or generally hostile state actors attacking state and local governments, universities and other ICN constituents. DoIT will provide network security and managed services, including scanning for vulnerabilities on network systems, as further described in Appendix A, the terms and conditions of which are attached hereto and incorporated herein.
Network security management. 1. NautaDutilh manages and controls its networks and properly protects them against threats and maintains security for the information assets that use the network, including information assets that are transmitted.
Network security management. The Supplier shall (and shall ensure that its Subcontractors shall) maintain the appropriate confidentiality, integrity, and availability of Lloyd’s Information, by: • utilising secure network architecture and operations; • ensuring that networks carrying Lloyd’s Information are designed, built, monitored, and managed according to industry standards, best practices and frameworks e.g. ISO27001, TOGAF, OWASP ITIL, etc. such that they enforce the required information security policy boundaries. These boundaries must prevent unauthorised access to Systems and Lloyd’s Systems or Lloyd’s Information by default, and allow only explicitly authorised and authenticated access. The Supplier shall (and shall ensure that its Subcontractors shall) ensure that anti-virus and firewall protection systems are implemented in relation to both internal and external traffic and ensure that: • firewall platforms are hardened; • penetration tests of firewall protected network connections are conducted by trained personnel on a regular basis; • firewalls have real-time logging and alerting capabilities; • intrusion detection systems are implemented where Internet connections exist; • access lists are implemented on network routers to restrict access to sensitive internal networks or servers. Remote support access shall be controlled via a secure gateway that implements the following controls: • strong authentication (e.g. two-factor authentication); • access via a secure gateway (e.g. a firewall or the Azure portal); • remote support accounts only enabled for the duration of troubleshooting activity; • all troubleshooting activity is logged and reviewed. The Supplier shall seek prior written Lloyd’s approval to use any Supplier provider of remote support of Supplier systems. Any such approved Subcontractor shall be subject to a contract between the Supplier and such Subcontractor detailing security requirements in relation to such support, and that access granted to the Subcontractor in order to provide such support is given with minimum privileges and revoked on completion. The Supplier shall develop and implement an appropriate internet, email and acceptable use policy and ensure that appropriate controls are in place and documented to prevent unauthorised download of software or web content by Supplier (or Subcontractor) personnel. The Supplier shall ensure that utility programs capable of overriding system and application controls shall be restricted and tightly controlled. T...
Network security management. 4.1. Attack Prevention - WFS will employ adequate measures to protect the networks hosting information systems against or limit the effects of attacks by unauthorized users.
Network security management. 13.1.1 Network controls Defined in the Eight Technology Information Security Policy and security manual
Network security management. Physical Security - The GSP must provide a copy of its policy restricting physical access to all in-house facilities and equipment.
AutoNDA by SimpleDocs

Related to Network security management

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

  • Patch Management All workstations, laptops and other systems that process and/or 22 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 23 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 24 necessary. There must be a documented patch management process which determines installation 25 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 26 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 27 and systems that cannot be patched due to operational reasons must have compensatory controls 28 implemented to minimize risk, where possible.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Traffic Management The Customer will not utilize the Services in a manner which, in the view of the Centre Operator, significantly distorts traffic balance on the Centre Operator’s circuits which are shared with other users. If, in the reasonable view of the Centre Operator, the Customer’s traffic patterns cause or may cause such distortion, the Customer should have a dedicated circuit capability. If the Customer declines to do so then the Centre Operator may suspend the Services while the matter is being resolved. If there is no resolution within 5 business days then either party may terminate the Agreement.

  • Network Services Preventive care: 100% coverage. Preventive services include, but are not restricted to routine physical exams, routine gynecological exams, routine hearing exams, routine eye exams, and immunizations. A $100 single and $200 family combined annual deductible will apply to lab/diagnostic testing after which 100% coverage will apply. A $50 copay will apply to CT and MRI scans.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Workload Management 11.1 The parties to this Agreement acknowledge that employees and management have a responsibility to maintain a balanced workload and recognise the adverse affects that excessive workloads may have on employee/s and the quality of resident/client care.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

Time is Money Join Law Insider Premium to draft better contracts faster.