Secure Hosting Sample Clauses

Secure Hosting. We utilize an Infrastructure as Code (IaC) proces. This gives us a good overview on our cluster and security rules. In this container-based architecture we have rules in place for firewalls, patch/package management, vulnerability scans, health monitoring and alerting, and so on. Firewalls (with a deny-by-default posture) protect the internal network zones and the network as a whole.
AutoNDA by SimpleDocs
Secure Hosting. A proven hosting process and facility with Quest that meets and exceeds required security standards including HIPAA.
Secure Hosting. For our hosting needs, Foleon relies on the services of Rackspace. They are responsible for our complete hardware setup and are required to notify us of any security incident. They assist us in infrastructure deployment, configuration, maintenance, and various aspects of information security, including Intrusion Detection System (IDS), Intrusion Prevention System (IPS), firewalls, patch management, health monitoring and alerting, and so on. Firewalls (with a deny-by-default posture) protect the internal network zones and the network as a whole.
Secure Hosting. For our hosting needs, Foleon relies on the services of GCP. They are responsible for our complete hardware setup and are required to notify us of any security incident. In our Kubernetes clusters we have a high standard in infrastructure deployment, configuration, maintenance, and various aspects of information security, including Egress, firewalls, health monitoring and alerting, and so on. Each docker image that has been created by Foleon has to pass a Vulnerability scan performed by Container Registry service.

Related to Secure Hosting

  • Construction Management Services a. A-E may be required to review and recommend approval of submittals, shop drawings, Request for Information (RFI) and/or calculations for temporary structures such as trench shoring, false work and other temporary structural forms.

  • Mobile Banking Services Mobile Banking is a personal financial information management service that allows you to access account information and conduct transactions using compatible and supported mobile phones and/or other compatible and supported wireless devices (including phones, "Wireless Devices"). We reserve the right to modify the scope of the Mobile Banking services at any time. We reserve the right to refuse to make any transaction you request through Mobile Banking. You agree and understand that Mobile Banking may not be accessible or may have limited utility over some mobile telephone networks, such as while roaming.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

  • Asset Management Services (i) Real Estate and Related Services:

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Student Services 1. Students taking college classes for dual credit may utilize the same services that are available to other MCC students. MCC is responsible for ensuring timely and efficient access to such services as academic advising, learning materials (e.g., library resources), and other services for which the student may be eligible. [TAC 19, Part 1, Chapter 4, Subchapter D, §4.85 (g)(2)]

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Inpatient Services Hospital This plan covers services provided while inpatient in a general or specialty hospital including, but not limited to the following: • anesthesia; • diagnostic tests and lab services; • dialysis; • drugs; • intensive care/coronary care; • nursing care; • physical, occupational, speech and respiratory therapies; • physician’s services while hospitalized; • radiation therapy; • surgery related services; and • room and board. Notify us if you are admitted from the emergency room to a hospital that is not in our network. Our Customer Service Department can assist you with any questions you may have about your coverage. Rehabilitation Facility This plan covers rehabilitation services received in a general hospital or specialty hospital. Coverage is limited to the number of days shown in the Summary of Medical Benefits.

Time is Money Join Law Insider Premium to draft better contracts faster.