{"component": "clause", "props": {"groups": [{"snippet": "The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.", "size": 27, "snippet_links": [{"key": "aws-network", "type": "definition", "offset": [4, 15]}, {"key": "any-other-person", "type": "definition", "offset": [80, 96]}, {"key": "the-services", "type": "definition", "offset": [121, 133]}, {"key": "access-controls", "type": "definition", "offset": [153, 168]}, {"key": "network-connection", "type": "clause", "offset": [244, 262]}, {"key": "functionally-equivalent", "type": "definition", "offset": [307, 330]}, {"key": "authentication-controls", "type": "clause", "offset": [346, 369]}, {"key": "corrective-action", "type": "clause", "offset": [389, 406]}, {"key": "response-plans", "type": "clause", "offset": [420, 434]}, {"key": "respond-to", "type": "definition", "offset": [438, 448]}], "samples": [{"hash": "l7EbxemirG2", "uri": "/contracts/l7EbxemirG2#network-security", "label": "Data Processing Addendum", "score": 35.5312995911, "published": true}, {"hash": "3vDzeo1MatO", "uri": "/contracts/3vDzeo1MatO#network-security", "label": "Data Processing Addendum", "score": 33.9778594971, "published": true}, {"hash": "lrjsEm3WIBK", "uri": "/contracts/lrjsEm3WIBK#network-security", "label": "Data Processing Addendum", "score": 32.4822349548, "published": true}], "hash": "8323fd4b62a35ffc32ba19d4a324aea7", "id": 1}, {"snippet": "Contractor\u2019s network security must include the following:\n6.1 Network firewall provisioning;\n6.2 Intrusion detection;\n6.3 Quarterly vulnerability assessments; and\n6.4 Annual penetration tests.", "size": 10, "snippet_links": [{"key": "intrusion-detection", "type": "clause", "offset": [97, 116]}, {"key": "vulnerability-assessments", "type": "clause", "offset": [132, 157]}, {"key": "penetration-tests", "type": "definition", "offset": [174, 191]}], "samples": [{"hash": "gXT0EDPYqeb", "uri": "/contracts/gXT0EDPYqeb#network-security", "label": "Professional Services", "score": 34.6308555603, "published": true}, {"hash": "4HIovTK3X0F", "uri": "/contracts/4HIovTK3X0F#network-security", "label": "Prevention and Promotion Client Services Contract", "score": 34.2474937439, "published": true}, {"hash": "iEEKqFxaFDl", "uri": "/contracts/iEEKqFxaFDl#network-security", "label": "Prevention and Promotion Client Services Contract", "score": 34.1316604614, "published": true}], "hash": "a67a2017f32e62c97489424fcd27fd4e", "id": 10}, {"snippet": "Contractor agrees at all times to maintain network security that - at a minimum - includes: network firewall provisioning, intrusion detection, and regular third party penetration testing. Contractor also agrees to maintain network security that conforms to one of the following:\n(1) Those standards the State of Utah applies to its own network, found outlined in DTS Policy 5000-0002 Enterprise Information Security Policy (copy available upon request);\n(2) Current standards set forth and maintained by the National Institute of Standards and Technology, includes those at: \u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf; or\n(3) Any generally recognized comparable standard that Contractor then applies to its own network and approved by DTS in writing.", "size": 15, "snippet_links": [{"key": "contractor-agrees", "type": "clause", "offset": [0, 17]}, {"key": "at-all-times", "type": "clause", "offset": [18, 30]}, {"key": "to-maintain", "type": "clause", "offset": [31, 42]}, {"key": "intrusion-detection", "type": "clause", "offset": [123, 142]}, {"key": "third-party", "type": "clause", "offset": [156, 167]}, {"key": "penetration-testing", "type": "definition", "offset": [168, 187]}, {"key": "agrees-to", "type": "clause", "offset": [205, 214]}, {"key": "state-of-utah", "type": "definition", "offset": [304, 317]}, {"key": "applies-to", "type": "clause", "offset": [318, 328]}, {"key": "information-security-policy", "type": "definition", "offset": [396, 423]}, {"key": "upon-request", "type": "definition", "offset": [440, 452]}, {"key": "current-standards", "type": "clause", "offset": [459, 476]}, {"key": "national-institute-of-standards-and-technology", "type": "definition", "offset": [509, 555]}, {"key": "approved-by", "type": "clause", "offset": [755, 766]}, {"key": "in-writing", "type": "definition", "offset": [771, 781]}], "samples": [{"hash": "cvupCIJZUlM", "uri": "/contracts/cvupCIJZUlM#network-security", "label": "State Cooperative Contract for Information Technology Products and Services", "score": 30.5342521667, "published": true}, {"hash": "i7UCHVFrP3G", "uri": "/contracts/i7UCHVFrP3G#network-security", "label": "Master Agreement", "score": 29.2404918671, "published": true}, {"hash": "6JVl6aJHCsa", "uri": "/contracts/6JVl6aJHCsa#network-security", "label": "Cooperative Contract", "score": 28.2139797211, "published": true}], "hash": "278c2e6d43a4bdf7cf2073a81a6dcd3f", "id": 6}, {"snippet": "AWS provides a strong foundation of security and compliance which we supplement by employing industry standard network security controls designed to protect Customer Data, including, but not limited to, the following:", "size": 12, "snippet_links": [{"key": "security-and-compliance", "type": "clause", "offset": [36, 59]}, {"key": "industry-standard", "type": "clause", "offset": [93, 110]}, {"key": "network-security-controls", "type": "clause", "offset": [111, 136]}, {"key": "customer-data", "type": "definition", "offset": [157, 170]}, {"key": "not-limited", "type": "clause", "offset": [187, 198]}], "samples": [{"hash": "jfEsmiBddfP", "uri": "/contracts/jfEsmiBddfP#network-security", "label": "Genesys Cloud Service Agreement", "score": 31.136472702, "published": true}, {"hash": "8J663wBta0K", "uri": "/contracts/8J663wBta0K#network-security", "label": "Genesys Cloud Service Agreement", "score": 31.0598258972, "published": true}, {"hash": "bvIHFY1krXQ", "uri": "/contracts/bvIHFY1krXQ#network-security", "label": "Purecloud Service Agreement", "score": 30.7231292725, "published": true}], "hash": "e81a34cf41980503002588f4e5838507", "id": 8}, {"snippet": "Customer acknowledges that a third-party is used by Tyler Technologies to process IVR Data. Customer\u2019s content will pass through and be stored on the third-party servers and will not be segregated or in a separate physical location from servers on which other customers\u2019 content is or will be transmitted or stored.", "size": 11, "snippet_links": [{"key": "customer-acknowledges", "type": "clause", "offset": [0, 21]}, {"key": "pass-through", "type": "definition", "offset": [116, 128]}, {"key": "a-separate", "type": "definition", "offset": [203, 213]}, {"key": "physical-location", "type": "clause", "offset": [214, 231]}, {"key": "other-customers", "type": "definition", "offset": [254, 269]}], "samples": [{"hash": "fwMPDPg9lkj", "uri": "/contracts/fwMPDPg9lkj#network-security", "label": "Software as a Service Agreement", "score": 32.3573379517, "published": true}, {"hash": "jQsf3L9icWz", "uri": "/contracts/jQsf3L9icWz#network-security", "label": "Software as a Service Agreement", "score": 31.7852287292, "published": true}, {"hash": "6yibJgc2kx3", "uri": "/contracts/6yibJgc2kx3#network-security", "label": "Software as a Service Agreement", "score": 31.7550449371, "published": true}], "hash": "7faf1390e26be8113a2518d11836b028", "id": 9}, {"snippet": "11.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.\n11.2 Each Party is responsible to provide security and privacy of communications. This entails protecting the confidential nature of Telecommunications transmissions between End User Customers during technician work operations and at all times. Specifically, no employee, agent or representative shall monitor any circuits except as required to repair or provide service of any End User Customer at any time. Nor shall an employee, agent or representative disclose the nature of overheard conversations, or who participated in such communications or even that such communication has taken place. Violation of such security may entail state and federal criminal penalties, as well as civil penalties. CLEC is responsible for covering its employees on such security requirements and penalties.\n11.3 The Parties' Telecommunications networks are part of the national security network, and as such, are protected by federal law. Deliberate sabotage or disablement of any portion of the underlying equipment used to provide the network is a violation of federal statutes with severe penalties, especially in times of national emergency or state of war. The Parties are responsible for covering their employees on such security requirements and penalties.\n11.4 CenturyLink and CLEC share responsibility for security and network protection for each Collocation arrangement. Each Party's employees, agents or representatives must secure its own portable test equipment, spares, etc. and shall not use the test equipment or spares of other parties. Use of such test equipment or spares without written permission constitutes theft and may be prosecuted. Exceptions are the use of CenturyLink ladders in the Wire Center, either rolling or track, which CLEC may use in the course of work operations. CenturyLink assumes no liability to CLEC, its agents, employees or representatives, if CLEC uses a CenturyLink ladder available in the Wire Center.\n11.5 Each Party is responsible for the physical security of its employees, agents or representatives. Providing safety glasses, gloves, etc. must be done by the respective employing Party. Hazards handling and safety procedures relative to the Telecommunications environment is the training responsibility of the employing Party. Proper use of tools, ladders, and test gear is the training responsibility of the employing Party.\n11.6 In the event that one Party's employees, agents or representatives inadvertently damage or impair the equipment of the other Party, prompt notification will be given to the damaged Party by verbal notification between the Parties' technicians at the site or by telephone to each Party's 24 x 7 security numbers.\n11.7 Each Party shall comply at all times with CenturyLink security and safety procedures and requirements while performing work activities on CenturyLink's Premises.\n11.8 CenturyLink will allow CLEC to inspect or observe spaces which house or contain CLEC equipment or equipment enclosures at any time and to furnish CLEC with all keys, entry codes, lock combinations, or other materials or information which may be needed to gain entry into any secured CLEC space, in a manner consistent with that used by CenturyLink.\n11.9 CenturyLink will limit the keys used in its keying systems for enclosed collocated spaces which contain or house CLEC equipment or equipment enclosures to its employees and representatives to emergency access only. CLEC shall further have the right to change locks where deemed necessary for the protection and security of such spaces.\n11.10 Keys may entail either metallic keys or combination electronic ID/key cards. It is solely the responsibility of CLEC to ensure keys are not shared with unauthorized personnel and recover keys and electronic ID/keys promptly from discharged personnel, such that office security is always maintained. CenturyLink has similar responsibility for its employees.\n11.11 CLEC will train its employees, agents and vendors on CenturyLink security policies and guidelines.\n11.12 When working on CenturyLink ICDF Frames or in CenturyLink's common or CLEC equipment line-ups, CenturyLink and CLEC employees, agents and vendors agree to adhere to CenturyLink quality and performance standards provided by CenturyLink and as specified in this Agreement.\n11.13 CLEC shall report all material losses to CenturyLink Security. All security incidents are to be referred directly to local CenturyLink Security \u2013 \u2587-\u2587\u2587\u2587-\u2587\u2587\u2587-\u2587\u2587\u2587\u2587. In cases of emergency, CLEC shall call 911 and \u2587-\u2587\u2587\u2587-\u2587\u2587\u2587-\u2587\u2587\u2587\u2587.\n11.14 CenturyLink and CLEC employees, agents and vendors will display the identification/access card above the waist and visible at all times.\n11.15 CenturyLink and CLEC shall ensure adherence by their employees, agents and vendors to all applicable CenturyLink environmental health and safety regulations. This includes all fire/life safety matters, OSHA, EPA, Federal, State and local regulations, including evacuation plans and indoor air quality.\n11.16 CenturyLink and CLEC employees, agents and vendors will secure and lock all doors and gates.\n11.17 CLEC will report to CenturyLink all property and equipment losses immediately, any lost cards or keys, vandalism, unsecured conditions, security violations, anyone who is unauthorized to be in the work area or is not wearing the CenturyLink identification/access card.\n11.18 CenturyLink and CLEC's employees, agents and vendors shall comply with CenturyLink Central Office fire and safety regulations, which include but are not limited to, wearing safety glasses in designated areas, keeping doors and aisles free and clean of trip hazards such as wire, checking ladders before moving, not leaving test equipment or tools on rolling ladders, not blocking doors open, providing safety straps and cones in installation areas, using electrostatic discharge protection, and exercising good housekeeping.\n11.19 Smoking is not allowed in CenturyLink buildings, Wire Centers, or other CenturyLink facilities. No open flames shall be permitted anywhere within the buildings, Wire Centers or other facilities. Failure to abide by this restriction may result in denial of access for that individual and may constitute a violation of the access rules, subjecting CLEC employee, agent or vendor to denial of unescorted access. CenturyLink shall provide written notice within five (5) Days of CLEC violation of this provision to CLEC prior to denial of access and such notice shall include: 1) identification of the violation of this provision and the personnel involved,", "size": 19, "snippet_links": [{"key": "protection-of-service-and-property", "type": "clause", "offset": [5, 39]}, {"key": "each-party", "type": "clause", "offset": [41, 51]}, {"key": "degree-of-care", "type": "clause", "offset": [76, 90]}, {"key": "damage-to-the", "type": "clause", "offset": [110, 123]}, {"key": "other-party", "type": "clause", "offset": [124, 135]}, {"key": "third-parties", "type": "definition", "offset": [144, 157]}, {"key": "end-user-customers", "type": "clause", "offset": [184, 202]}, {"key": "own-personnel", "type": "clause", "offset": [251, 264]}, {"key": "privacy-of-communications", "type": "clause", "offset": [359, 384]}, {"key": "nature-of", "type": "clause", "offset": [427, 436]}, {"key": "work-operations", "type": "clause", "offset": [515, 530]}, {"key": "at-all-times", "type": "clause", "offset": [535, 547]}, {"key": "no-employee", "type": "clause", "offset": [563, 574]}, {"key": "as-required", "type": "clause", "offset": [634, 645]}, {"key": "to-repair", "type": "clause", "offset": [646, 655]}, {"key": "service-of", "type": "clause", "offset": [667, 677]}, {"key": "at-any-time", "type": "clause", "offset": [700, 711]}, {"key": "an-employee", "type": "clause", "offset": [723, 734]}, {"key": "the-nature", "type": "clause", "offset": [769, 779]}, {"key": "such-security", "type": "definition", "offset": [913, 926]}, {"key": "state-and-federal", "type": "definition", "offset": [938, 955]}, {"key": "criminal-penalties", "type": "clause", "offset": [956, 974]}, {"key": "civil-penalties", "type": "clause", "offset": [987, 1002]}, {"key": "responsible-for", "type": "clause", "offset": [1012, 1027]}, {"key": "employees-on", "type": "clause", "offset": [1041, 1053]}, {"key": "security-requirements", "type": "clause", "offset": [1059, 1080]}, {"key": "telecommunications-networks", "type": "definition", "offset": [1114, 1141]}, {"key": "national-security", "type": "clause", "offset": [1158, 1175]}, {"key": "federal-law", "type": "definition", "offset": [1215, 1226]}, {"key": "equipment-used", "type": "clause", "offset": [1296, 1310]}, {"key": "the-network", "type": "definition", "offset": [1322, 1333]}, {"key": "federal-statutes", "type": "definition", "offset": [1352, 1368]}, {"key": "national-emergency", "type": "clause", "offset": [1415, 1433]}, {"key": "state-of", "type": "definition", "offset": [1437, 1445]}, {"key": "parties-are", "type": "clause", "offset": [1455, 1466]}, {"key": "their-employees", "type": "definition", "offset": [1492, 1507]}, {"key": "responsibility-for-security", "type": "clause", "offset": [1585, 1612]}, {"key": "network-protection", "type": "clause", "offset": [1617, 1635]}, {"key": "collocation-arrangement", "type": "definition", "offset": [1645, 1668]}, {"key": "test-equipment", "type": "clause", "offset": [1749, 1763]}, {"key": "other-parties", "type": "definition", "offset": [1828, 1841]}, {"key": "written-permission", "type": "definition", "offset": [1888, 1906]}, {"key": "wire-center", "type": "clause", "offset": [2001, 2012]}, {"key": "of-work", "type": "clause", "offset": [2072, 2079]}, {"key": "no-liability", "type": "definition", "offset": [2112, 2124]}, {"key": "security-of", "type": "clause", "offset": [2288, 2299]}, {"key": "safety-glasses", "type": "clause", "offset": [2352, 2366]}, {"key": "employing-party", "type": "definition", "offset": [2412, 2427]}, {"key": "the-training", "type": "clause", "offset": [2518, 2530]}, {"key": "responsibility-of-the", "type": "clause", "offset": [2531, 2552]}, {"key": "use-of-tools", "type": "clause", "offset": [2577, 2589]}, {"key": "in-the-event", "type": "clause", "offset": [2674, 2686]}, {"key": "one-party", "type": "definition", "offset": [2692, 2701]}, {"key": "the-equipment", "type": "clause", "offset": [2772, 2785]}, {"key": "prompt-notification", "type": "definition", "offset": [2806, 2825]}, {"key": "will-be-given", "type": "clause", "offset": [2826, 2839]}, {"key": "damaged-party", "type": "definition", "offset": [2847, 2860]}, {"key": "verbal-notification", "type": "clause", "offset": [2864, 2883]}, {"key": "between-the-parties", "type": "clause", "offset": [2884, 2903]}, {"key": "the-site", "type": "clause", "offset": [2920, 2928]}, {"key": "by-telephone", "type": "clause", "offset": [2932, 2944]}, {"key": "security-numbers", "type": "clause", "offset": [2968, 2984]}, {"key": "procedures-and-requirements", "type": "clause", "offset": [3065, 3092]}, {"key": "work-activities", "type": "definition", "offset": [3110, 3125]}, {"key": "lock-combinations", "type": "clause", "offset": [3337, 3354]}, {"key": "other-materials", "type": "clause", "offset": [3359, 3374]}, {"key": "information-which", "type": "clause", "offset": [3378, 3395]}, {"key": "consistent-with", "type": "definition", "offset": [3465, 3480]}, {"key": "keying-systems", "type": "clause", "offset": [3556, 3570]}, {"key": "employees-and-representatives", "type": "clause", "offset": [3671, 3700]}, {"key": "access-only", "type": "definition", "offset": [3714, 3725]}, {"key": "right-to-change-locks", "type": "clause", "offset": [3755, 3776]}, {"key": "necessary-for", "type": "definition", "offset": [3790, 3803]}, {"key": "protection-and-security", "type": "clause", "offset": [3808, 3831]}, {"key": "electronic-id", "type": "definition", "offset": [3906, 3919]}, {"key": "key-cards", "type": "clause", "offset": [3920, 3929]}, {"key": "to-ensure", "type": "clause", "offset": [3971, 3980]}, {"key": "unauthorized-personnel", "type": "clause", "offset": [4006, 4028]}, {"key": "office-security", "type": "clause", "offset": [4115, 4130]}, {"key": "policies-and-guidelines", "type": "clause", "offset": [4291, 4314]}, {"key": "equipment-line", "type": "definition", "offset": [4397, 4411]}, {"key": "agree-to", "type": "clause", "offset": [4468, 4476]}, {"key": "adhere-to", "type": "clause", "offset": [4477, 4486]}, {"key": "and-performance-standards", "type": "clause", "offset": [4507, 4532]}, {"key": "as-specified", "type": "clause", "offset": [4561, 4573]}, {"key": "in-this-agreement", "type": "definition", "offset": [4574, 4591]}, {"key": "material-losses", "type": "definition", "offset": [4621, 4636]}, {"key": "security-incidents", "type": "clause", "offset": [4666, 4684]}, {"key": "cases-of-emergency", "type": "clause", "offset": [4764, 4782]}, {"key": "access-card", "type": "clause", "offset": [4913, 4924]}, {"key": "health-and-safety-regulations", "type": "clause", "offset": [5100, 5129]}, {"key": "safety-matters", "type": "clause", "offset": [5159, 5173]}, {"key": "local-regulations", "type": "definition", "offset": [5205, 5222]}, {"key": "plans-and", "type": "definition", "offset": [5245, 5254]}, {"key": "indoor-air-quality", "type": "clause", "offset": [5255, 5273]}, {"key": "lock-all-doors", "type": "clause", "offset": [5348, 5362]}, {"key": "report-to", "type": "definition", "offset": [5390, 5399]}, {"key": "equipment-losses", "type": "clause", "offset": [5429, 5445]}, {"key": "lost-cards", "type": "clause", "offset": [5463, 5473]}, {"key": "security-violations", "type": "clause", "offset": [5516, 5535]}, {"key": "work-area", "type": "clause", "offset": [5577, 5586]}, {"key": "comply-with", "type": "definition", "offset": [5714, 5725]}, {"key": "central-office", "type": "clause", "offset": [5738, 5752]}, {"key": "fire-and-safety-regulations", "type": "clause", "offset": [5753, 5780]}, {"key": "not-limited", "type": "clause", "offset": [5804, 5815]}, {"key": "designated-areas", "type": "clause", "offset": [5846, 5862]}, {"key": "safety-straps", "type": "clause", "offset": [6057, 6070]}, {"key": "electrostatic-discharge-protection", "type": "clause", "offset": [6110, 6144]}, {"key": "good-housekeeping", "type": "definition", "offset": [6161, 6178]}, {"key": "not-allowed", "type": "definition", "offset": [6197, 6208]}, {"key": "no-open-flames", "type": "clause", "offset": [6282, 6296]}, {"key": "the-buildings", "type": "clause", "offset": [6332, 6345]}, {"key": "other-facilities", "type": "clause", "offset": [6363, 6379]}, {"key": "failure-to", "type": "clause", "offset": [6381, 6391]}, {"key": "denial-of-access", "type": "clause", "offset": [6432, 6448]}, {"key": "violation-of-the", "type": "clause", "offset": [6490, 6506]}, {"key": "access-rules", "type": "clause", "offset": [6507, 6519]}, {"key": "vendor-to", "type": "clause", "offset": [6556, 6565]}, {"key": "unescorted-access", "type": "definition", "offset": [6576, 6593]}, {"key": "written-notice", "type": "definition", "offset": [6621, 6635]}, {"key": "prior-to", "type": "clause", "offset": [6701, 6709]}, {"key": "personnel-involved", "type": "clause", "offset": [6819, 6837]}], "samples": [{"hash": "kfG99anSRWV", "uri": "/contracts/kfG99anSRWV#network-security", "label": "Interconnection Agreement", "score": 29.3390369415, "published": true}, {"hash": "k5chBYEFiOR", "uri": "/contracts/k5chBYEFiOR#network-security", "label": "Interconnection Agreement", "score": 29.3390369415, "published": true}, {"hash": "hyGlICRWhsn", "uri": "/contracts/hyGlICRWhsn#network-security", "label": "Interconnection Agreement", "score": 29.3390369415, "published": true}], "hash": "4da8e5a3293d540176de5bf6e0109b55", "id": 3}, {"snippet": "Supplier agrees at all times to maintain network security that, at a minimum, includes: network firewall provisioning, intrusion detection, and regular (at least annual) third party vulnerability assessments. Likewise, Supplier agrees to maintain network security that conforms to generally recognized industry standards (as described in Section C.5) and best practices that Supplier then applies to its own network.", "size": 25, "snippet_links": [{"key": "at-all-times", "type": "clause", "offset": [16, 28]}, {"key": "to-maintain", "type": "clause", "offset": [29, 40]}, {"key": "intrusion-detection", "type": "clause", "offset": [119, 138]}, {"key": "third-party", "type": "clause", "offset": [170, 181]}, {"key": "vulnerability-assessments", "type": "clause", "offset": [182, 207]}, {"key": "agrees-to", "type": "clause", "offset": [228, 237]}, {"key": "industry-standards", "type": "definition", "offset": [302, 320]}, {"key": "best-practices", "type": "definition", "offset": [355, 369]}, {"key": "applies-to", "type": "clause", "offset": [389, 399]}], "samples": [{"hash": "1nxjuDaVddO", "uri": "/contracts/1nxjuDaVddO#network-security", "label": "Purchase Order", "score": 34.3301200867, "published": true}, {"hash": "1ut45BvTK2j", "uri": "/contracts/1ut45BvTK2j#network-security", "label": "Purchase Order Agreement", "score": 34.2466430664, "published": true}, {"hash": "5Bx3VVF8EV7", "uri": "/contracts/5Bx3VVF8EV7#network-security", "label": "Purchase Order Agreement", "score": 33.8912353516, "published": true}], "hash": "894e9e23bc31a7c38bffbb4975ebcd53", "id": 2}, {"snippet": "Seller and Purchaser understand and agree that the State of Mississippi\u2019s Enterprise Security Policy mandates that all remote access to and/or from the State network must be accomplished via a Virtual Private Network (VPN). If remote access is required at any time during the life of this Agreement, Seller and Purchaser agree to implement/maintain a VPN for this connectivity. This required VPN must be IPSec-capable (ESP tunnel mode) and will terminate on a Cisco VPN-capable device ( i.e. VPN concentrator, PIX firewall, etc.) on the State\u2019s premises. Seller agrees that it must, at its expense, implement/maintain a compatible hardware/software solution to terminate the specified VPN on the Seller\u2019s premises. The parties further understand and agree that the State protocol standard and architecture are based on industry-standard security protocols and manufacturer engaged at the time of contract execution. The State reserves the right to introduce a new protocol and architecture standard and require the Seller to comply with same, in the event the industry introduces a more secure, robust protocol to replace IPSec/ESP and/or there is a change in the manufacturer engaged.", "size": 14, "snippet_links": [{"key": "seller-and-purchaser", "type": "definition", "offset": [0, 20]}, {"key": "understand-and-agree-that", "type": "clause", "offset": [21, 46]}, {"key": "state-of-mississippi", "type": "clause", "offset": [51, 71]}, {"key": "security-policy", "type": "definition", "offset": [85, 100]}, {"key": "access-to", "type": "definition", "offset": [126, 135]}, {"key": "state-network", "type": "definition", "offset": [152, 165]}, {"key": "virtual-private-network", "type": "definition", "offset": [193, 216]}, {"key": "at-any-time", "type": "clause", "offset": [253, 264]}, {"key": "life-of-this-agreement", "type": "clause", "offset": [276, 298]}, {"key": "agree-to", "type": "clause", "offset": [321, 329]}, {"key": "software-solution", "type": "definition", "offset": [640, 657]}, {"key": "the-seller", "type": "clause", "offset": [692, 702]}, {"key": "the-parties", "type": "definition", "offset": [715, 726]}, {"key": "based-on", "type": "clause", "offset": [810, 818]}, {"key": "security-protocols", "type": "clause", "offset": [837, 855]}, {"key": "contract-execution", "type": "clause", "offset": [896, 914]}, {"key": "right-to", "type": "clause", "offset": [939, 947]}, {"key": "require-the", "type": "clause", "offset": [1003, 1014]}, {"key": "comply-with", "type": "definition", "offset": [1025, 1036]}, {"key": "in-the-event-the", "type": "clause", "offset": [1043, 1059]}, {"key": "a-change-in", "type": "definition", "offset": [1148, 1159]}, {"key": "the-manufacturer", "type": "definition", "offset": [1160, 1176]}], "samples": [{"hash": "lj2NYAyThkY", "uri": "/contracts/lj2NYAyThkY#network-security", "label": "Turnkey Agreement", "score": 33.1330299377, "published": true}, {"hash": "fQFClHA08Sz", "uri": "/contracts/fQFClHA08Sz#network-security", "label": "Purchase Agreement", "score": 30.0726509094, "published": true}, {"hash": "b1cX9ktE9AM", "uri": "/contracts/b1cX9ktE9AM#network-security", "label": "Purchase Agreement", "score": 30.0343284607, "published": true}], "hash": "37c1a6cbe6f3c8f8ec2b771ed45eaf74", "id": 7}, {"snippet": "The Data Importer maintains network security using commercially available equipment and industry standard techniques, including firewalls, intrusion detection systems, access control lists and routing protocols.", "size": 18, "snippet_links": [{"key": "data-importer", "type": "definition", "offset": [4, 17]}, {"key": "available-equipment", "type": "clause", "offset": [64, 83]}, {"key": "industry-standard", "type": "clause", "offset": [88, 105]}, {"key": "intrusion-detection-systems", "type": "clause", "offset": [139, 166]}, {"key": "access-control", "type": "clause", "offset": [168, 182]}], "samples": [{"hash": "1YaHVJ83TRZ", "uri": "/contracts/1YaHVJ83TRZ#network-security", "label": "Clinical Trial Agreement", "score": 33.1357650757, "published": true}, {"hash": "Yukv1jAsX7", "uri": "/contracts/Yukv1jAsX7#network-security", "label": "Clinical Trial Agreement", "score": 32.5267944336, "published": true}, {"hash": "gqvQA5uQCsB", "uri": "/contracts/gqvQA5uQCsB#network-security", "label": "Clinical Trial Agreement", "score": 32.321975708, "published": true}], "hash": "f3b604aac44e3c2e0f45e2d4f915a034", "id": 4}, {"snippet": "Axis maintains corrective action and incident response plans to respond to potential security threats. The Services handling the transport of personal data is end-to-end encrypted, based on industry standards (HTTPS/TLS RFC 2818/8446) and Axis prevents unauthorized access and eavesdropping to these resources or devices. It is at customers discretion to allow Axis employees explicit time-limited access to personal data, and devices for debugging purposes.", "size": 15, "snippet_links": [{"key": "corrective-action", "type": "clause", "offset": [15, 32]}, {"key": "response-plans", "type": "clause", "offset": [46, 60]}, {"key": "respond-to", "type": "definition", "offset": [64, 74]}, {"key": "the-services", "type": "definition", "offset": [103, 115]}, {"key": "transport-of", "type": "clause", "offset": [129, 141]}, {"key": "based-on", "type": "clause", "offset": [181, 189]}, {"key": "industry-standards", "type": "definition", "offset": [190, 208]}, {"key": "unauthorized-access", "type": "clause", "offset": [253, 272]}, {"key": "access-to-personal-data", "type": "clause", "offset": [398, 421]}, {"key": "devices-for", "type": "definition", "offset": [427, 438]}], "samples": [{"hash": "c11ahIdPpZz", "uri": "/contracts/c11ahIdPpZz#network-security", "label": "Product Specific Terms", "score": 34.4183425903, "published": true}, {"hash": "kAoDHVMvs0B", "uri": "/contracts/kAoDHVMvs0B#network-security", "label": "Product Specific Terms for Axis Video as a Service", "score": 33.950012207, "published": true}, {"hash": "8IHspmiAfzl", "uri": "/contracts/8IHspmiAfzl#network-security", "label": "Support Terms of Service", "score": 33.8720664978, "published": true}], "hash": "a81251256e105648bf327aafb4a5f525", "id": 5}], "next_curs": "ClkSU2oVc35sYXdpbnNpZGVyY29udHJhY3RzcjULEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhluZXR3b3JrLXNlY3VyaXR5IzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"children": [["protection-of-service-and-property", "Protection of Service and Property"], ["", ""], ["local-switching", "Local Switching"], ["usage", "Usage"], ["analog-trunk-port", "Analog Trunk Port"]], "size": 838, "title": "Network Security", "parents": [["general-terms", "General Terms"], ["definitions", "Definitions"], ["information-security-program", "Information Security Program"], ["miscellaneous", "Miscellaneous"], ["entire-agreement-conflict", "Entire Agreement; Conflict"]], "id": "network-security", "related": [["e7-security", "E7 Security", "E7 Security"], ["system-security", "System Security", "System Security"], ["job-security", "JOB SECURITY", "JOB SECURITY"], ["data-security", "Data Security", "Data Security"], ["internet-security", "Internet Security", "Internet Security"]], "related_snippets": [], "updated": "2026-04-05T05:49:25+00:00"}, "json": true, "cursor": ""}}