Common use of Security Standards Clause in Contracts

Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.

Appears in 7 contracts

Samples: Plus Ondemand License Agreement, Plus Ondemand License Agreement, Humanity Ondemand License Agreement

AutoNDA by SimpleDocs

Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from f rom unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.;

Appears in 2 contracts

Samples: Ondemand License Agreement, Plus Ondemand License Agreement

Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from f rom unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewallsf irewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.

Appears in 1 contract

Samples: Aladtec Scheduling License Agreement

Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from f rom unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewallsf irewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names usernames and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.

Appears in 1 contract

Samples: Schedulebase Scheduling License Agreement

Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from f rom unauthorized access, including without limitation (i) industry- industry-standard encryption of data at rest within TCP’s data centers; (ii) web application firewallsf irewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.

Appears in 1 contract

Samples: Humanity Scheduling License Agreement

AutoNDA by SimpleDocs

Security Standards. 3.1.1 i. TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from unauthorized access, including without limitation (i) industry- industry-standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.;

Appears in 1 contract

Samples: cdn2.assets-servd.host

Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from unauthorized access, including without limitation (i) industry- industry-standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.

Appears in 1 contract

Samples: TCP Services Agreement

Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with security standards such as AICPA’s SOC 2 Type II reporting standards2.

Appears in 1 contract

Samples: Scheduleanywhere Scheduling License Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.