Security Architecture Sample Clauses

Security Architecture. Toll transactions lead to money transfers and may be subject to various attacks. Each EFC-application defines a transaction data security scheme, e.g. based on the use of an encryption algorithm, which enables a very highly protected transaction scheme. The different EFC-applications have separate specifications with regard to Transaction Data, Transaction Model and Security Architecture. These specifications are listed in the table below: EFC-application Transaction Data Transaction Model Security Architecture Old AutoPASS TDS* AutoPASS AutoPASS AutoPASS Old BroBizz TDS* TFL DCAS UK DCAS-V2- 1 (Annex A in BroBizz doc.) PISTA TDS* ASETA PISTA 3.4 PISTA 3.7 EN 15509 based (EasyGo basic) EN 15509 EN 15509 EN 15509 security level 0 or 1 in NO CEN EN15509 EN15509 EN15509 EN15509 Security level 1 *Transponder Data Specification Table 2: Transaction Data, Transaction Model and Security Architecture
Security Architecture. Development The purpose of the “Security Architecture Development” process is to develop a plan and set of principles that describe: (a) the security services that a system is required to provide to meet the needs of its users; (b) the system elements required to implement the services; and (c) the performance levels required in the elements to deal with the threat environment, (the “Security Architecture”). The Security Architecture Development process includes the following activities, as applicable: 1 Receiving the Security Policy; IT Value Chain IM Description 2 Developing high level alternatives that comply with the Enterprise IT Architecture and selecting from among the alternatives, including by:
Security Architecture. 1. A structured and enforced security architecture covering all information resources, assets and standards of TikaMobile has been developed and applied to all lengths of the company.
Security Architecture. 6. A security architecture has been devised and applied across the information resources of Veeva. The architecture comprises a defined set of security mechanisms and supporting standards.
Security Architecture. Licensor is responsible for security of the Data Center including, but not limited to, servers, routers, firewalls, switches, circuits, and related software, and has deployed various types of defense against unauthorized access to the Data Center. Licensee-owned equipment that is connected to any Licensor-maintained device (e.g., border router, firewall) must comply with current Licensor requirements and standards, the current version of which are available upon request. Licensor will provide reasonable notice to Licensee of any change to the requirements or standards. Any anticipated changes to Licensee's environment that may affect the Hosting Services must be submitted in writing to Licensor for Licensor's review and approval at least one week prior to Licensee's scheduled implementation. If Licensee modifies its equipment or software configurations that result in any interruption of the Hosting Services, all diagnostic and repair time conducted by Licensor to restore connectivity will be billed to Licensee at Licensor's then-current rates. Upon Licensee's written request, Licensor will provide Licensee with a copy of the most recent independent security audit report (SAS 70) of Licensor's operations, provided that such SAS 70 report shall be treated as Licensor's Proprietary Information.
Security Architecture. Contractor specifically represents and warrants that with respect to Contractor-owned and/or controlled Hardware, Software and Environments, Contractor has established and during the term of this Agreement will at all times maintain: A security architecture that reasonably ensures implemented and effective NIST 800-53 security controls; A system of effective firewall(s) and intrusion detection technologies necessary to protect CDPH data; Appropriate network security design elements that provide for segregation of data; Procedures to encrypt information in transmission and storage; Procedures to ensure regular testing of Contractor'ssecurity systems and processes; Database and application layer design processes that ensure website applications are designed to protect CDPH data that is collected, processed, and transmitted through such systems.
Security Architecture. QBE and OnePath General shall demonstrate security architectural requirements are incorporated into their architecture proposals where the availability, integrity and confidentiality of relevant information may be impacted. Proposed security architecture must ensure that relevant information processed, stored and transmitted from information systems owned or managed by QBE or OnePath General are protected from internal and external threats.
Security Architecture 

Related to Security Architecture

  • Architecture All Redeveloper Improvements shall have consistent architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory building walls, screening walls, or fences shall use the same primary material, color, and detailing as on the main buildings, unless shown differently on approved Exterior Construction Documents.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers.

  • Security System Landlord shall not be obligated to provide or maintain any security patrol or security system. Landlord shall not be responsible for the quality of any such patrol or system which may be provided hereunder or for damage or injury to Tenant, its employees, invitees or others due to the failure, action or inaction of such patrol or system.

  • Network Interconnection Architecture DTI may interconnect with GTE at any of the minimum technically feasible points required by the FCC. Interconnection at additional points will be reviewed on an individual case basis. Where the Parties mutually agree following a Bona Fide Request to directly interconnect their respective networks, interconnection will be as specified in the following subsections. The "IPs" shall be set forth in Appendix B attached to this Agreement and made a part hereof. Based on the configuration, the installation timeline will vary considerably, however, GTE will work with DTI in all circumstances to install "IPs" within 120 calendar days absent extenuating circumstances. Internetwork connection and protocol must be based on industry standards developed consistent with Section 256 of the Telecommunications Act of 1996.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that any such products or services are compatible with the technology standards, including the assistive technology standard, all found at xxxxx:// The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Technology Upgrades 42.1 Notwithstanding any other provision of this Agreement, CenturyLink may deploy, upgrade, migrate and maintain its network at its discretion. Nothing in this Agreement shall limit CenturyLink’s ability to modify its network through the incorporation of new equipment or software or otherwise. CLEC shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.