Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.
Appears in 7 contracts
Samples: Plus Ondemand License Agreement, Plus Ondemand License Agreement, Humanity Ondemand License Agreement
Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from f rom unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.;
Appears in 2 contracts
Samples: Ondemand License Agreement, Plus Ondemand License Agreement
Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from f rom unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewallsf irewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.
Appears in 1 contract
Samples: Aladtec Scheduling License Agreement
Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from f rom unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewallsf irewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names usernames and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.
Appears in 1 contract
Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from f rom unauthorized access, including without limitation (i) industry- industry-standard encryption of data at rest within TCP’s data centers; (ii) web application firewallsf irewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.
Appears in 1 contract
Security Standards. 3.1.1 i. TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from unauthorized access, including without limitation (i) industry- industry-standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.;
Appears in 1 contract
Samples: cdn2.assets-servd.host
Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from unauthorized access, including without limitation (i) industry- industry-standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards.
Appears in 1 contract
Samples: TCP Services Agreement
Security Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from unauthorized access, including without limitation (i) industry- standard encryption of data at rest within TCP’s data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with security standards such as AICPA’s SOC 2 Type II reporting standards2.
Appears in 1 contract