Security and Processing Controls Sample Clauses

Security and Processing Controls. CSG shall have written standards and procedures in-place to address system configuration, operation and management that includes: (i) Security controls required for the system; (ii) Identification and patching of security vulnerabilities; (iii) Change control process and procedures; (iv) Problem management; and (v) Incident detection and management.
Security and Processing Controls. 8.1. Vendor shall have standards and procedures in-place to address system configuration, operation and management controls for the Systems and Networks, including the following: (a) Vendor shall employ industry-standard security technologies to protect data, including but not limited to physical access controls and logical access controls; (b) Security controls appropriate for the Systems and Networks and their application environment as recommended by manufacturers and best practices published by industry organizations; (c) Identification and patching of security vulnerabilities; (d) Change control process and procedures; (e) Problem management; (f) Incident detection, response and management; and (g) Data access entitlement and a review process for existing entitlements and changes to them. 8.2. If Vendor connects to the Internet or other external facilities it shall have in place technology controls including firewalls, security monitoring and alerting systems (I.E.
Security and Processing Controls. 8.1. Vendor shall have standards and procedures in-place to address system configuration, operation and management controls for the Systems and Networks, including the following: (a) Vendor shall employ industry-standard security technologies to protect data, including but not limited to physical access controls and logical access controls; (b) Security controls appropriate for the Systems and Networks and their application environment as recommended by manufacturers and best practices published by industry organizations; (c) Identification and patching of security vulnerabilities; (d) Change control process and procedures; (e) Problem management; (f) Incident detection, response and management; and (g) Data access entitlement and a review process for existing entitlements and changes to them. 8.2. If Vendor connects to the Internet or other external facilities it shall have in place technology controls including firewalls, security monitoring and alerting systems (i.e. Intrusion Detection Systems). The Vendor must implement and comply with Customer’s preferred security protocols, including but not limited to Single Sign On and Secure Email.
Security and Processing Controls. 8.1. Vendor shall have standards and procedures in-place to address system configuration, operation and management controls for the Systems and Networks, including the following: (a) Vendor shall employ industry-standard security technologies to protect data, including but not limited to physical access controls and logical access controls; (b) Security controls appropriate for the Systems and Networks and their application environment as recommended by manufacturers and best practices published by industry organizations; (c) Identification and patching of security vulnerabilities; (d) Change control process and procedures;
Security and Processing Controls. TELMETRICS shall maintain standards and procedures commensurate with industry standards to address the configuration, operation and management of systems, networks, services and PUBLISHER and end-user data, including: ***.
Security and Processing Controls 

Related to Security and Processing Controls

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Agreement Controls The terms and conditions of this Master Agreement control over the terms and conditions contained in an Approved Service Order – even if the Approved Service Order expressly states that it is intended to control. Any conflicting terms and conditions in an Approved Service Order are invalid and unenforceable.

  • Export Controls Both Parties will adhere to all applicable laws, regulations and rules relating to the export of technical data and will not export or re-export any technical data, any products received from the other Party or the direct product of such technical data to any proscribed country listed in such applicable laws, regulations and rules unless properly authorized.

  • Financial Controls At all times, the Charter School shall maintain appropriate governance and managerial procedures and financial controls which procedures and controls shall include, but not be limited to: (1) commonly accepted accounting practices and the capacity to implement them (2) a checking account; (3) adequate payroll procedures; (4) procedures for the creation and review of monthly and quarterly financial reports, which procedures shall specifically identify the individual who will be responsible for preparing such financial reports in the following fiscal year; (5) internal control procedures for cash receipts, cash disbursements and purchases; and (6) maintenance of asset registers and financial procedures for grants in accordance with applicable state and federal law.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.