Security and Processing Controls Sample Clauses
Security and Processing Controls. CSG shall have written standards and procedures in-place to address system configuration, operation and management that includes:
(i) Security controls required for the system;
(ii) Identification and patching of security vulnerabilities;
(iii) Change control process and procedures;
(iv) Problem management; and
(v) Incident detection and management.
Security and Processing Controls. 8.1. Vendor shall have standards and procedures in-place to address system configuration, operation and management controls for the Systems and Networks, including the following:
(a) Vendor shall employ industry-standard security technologies to protect data, including but not limited to physical access controls and logical access controls;
(b) Security controls appropriate for the Systems and Networks and their application environment as recommended by manufacturers and best practices published by industry organizations;
(c) Identification and patching of security vulnerabilities;
(d) Change control process and procedures;
(e) Problem management;
(f) Incident detection, response and management; and
(g) Data access entitlement and a review process for existing entitlements and changes to them.
8.2. If Vendor connects to the Internet or other external facilities it shall have in place technology controls including firewalls, security monitoring and alerting systems (I.E.
Security and Processing Controls. 8.1. Vendor shall have standards and procedures in-place to address system configuration, operation and management controls for the Systems and Networks, including the following:
(a) Vendor shall employ industry-standard security technologies to protect data, including but not limited to physical access controls and logical access controls;
(b) Security controls appropriate for the Systems and Networks and their application environment as recommended by manufacturers and best practices published by industry organizations;
(c) Identification and patching of security vulnerabilities;
(d) Change control process and procedures;
(e) Problem management;
(f) Incident detection, response and management; and
(g) Data access entitlement and a review process for existing entitlements and changes to them.
8.2. If Vendor connects to the Internet or other external facilities it shall have in place technology controls including firewalls, security monitoring and alerting systems (i.e. Intrusion Detection Systems). The Vendor must implement and comply with Customer’s preferred security protocols, including but not limited to Single Sign On and Secure Email.
Security and Processing Controls. 8.1. Vendor shall have standards and procedures in-place to address system configuration, operation and management controls for the Systems and Networks, including the following:
(a) Vendor shall employ industry-standard security technologies to protect data, including but not limited to physical access controls and logical access controls;
(b) Security controls appropriate for the Systems and Networks and their application environment as recommended by manufacturers and best practices published by industry organizations;
(c) Identification and patching of security vulnerabilities; (d) Change control process and procedures;
Security and Processing Controls. TELMETRICS shall maintain standards and procedures commensurate with industry standards to address the configuration, operation and management of systems, networks, services and PUBLISHER and end-user data, including: ***.
Security and Processing Controls
