Endpoint Security Sample Clauses

Endpoint Security. 1. Industry-standard firewalls are in place and configured to only permit traffic on ports necessary for the functioning of the Service with all others denied by default.
AutoNDA by SimpleDocs
Endpoint Security. (a) You may install the “agent” software component of the Endpoint Security Product on the number of Endpoints (or “Nodes”) stated in the applicable Grant Letter. For Endpoint Security Product, “Nodes” or “Endpoints” are computing devices owned or controlled by You (such as laptops, workstations, and servers), on which You install the agent software.
Endpoint Security. Ntrepid will maintain suitably-designed endpoint security controls for Ntrepid Systems, that include but are not limited to:
Endpoint Security. CityBridge will not scan or monitor web content for viruses or harmful applications. Users are expect to install and maintain antivirus and adhere to security best practices. To eliminate peer-to-peer security threats, wireless device peer-to-peer communication will be blocked at the network level.
Endpoint Security. Data Processor shall ensure that endpoints used for Processing are protected. Minimum requirements:
Endpoint Security. At this time, Endpoint Security is not subject to the SLAs described in this document.
Endpoint Security. The Services receive and deliver documents to and from Customer environments. Customer documents are scanned using anti-malware solutions when stored and processed within Basware environments. Documents detected to contain malware may be quarantined or deleted depending on the case. Where applicable, Basware provides reports for such rejected documents to Customer. Relevant Service components (e.g. servers) are also scanned for malware and monitored to detect malicious programs and files. Basware office environments are equipped with malware protection for workstations, internal servers, email attachments and other collaboration tools.
AutoNDA by SimpleDocs
Endpoint Security. Veego protect its endpoints against malware, ransomware, and exploitation using a leading Endpoint Protection Platform (EPP) and Endpoint Detection and Response (EDR) solution. Veego ensure endpoint security posture (e.g., approves operations systems and versions, host firewall, security patches, disk encryption, password-protection, lock screen after inactivity period, etc.).
Endpoint Security. Wolters Kluwer implements and maintains security mechanisms on endpoints, including firewalls, automated locking of devices after a specified period of inactivity, updated anti-virus, an advanced endpoint detection and response (EDR) solution, and full disk encryption. Wolters Kluwer restricts personnel from disabling security mechanisms.

Related to Endpoint Security

  • Account Security User agrees and acknowledges that to the extent applicable, it will: (i) maintain strict confidentiality of all names, passwords, or other credentials of User’s Authorized End Users; (ii) instructing its Authorized End Users not to allow others to obtain or use their credentials or to access the Software. User is responsible for any costs or damages incurred due to unauthorized use or access through User’s Authorized End Users’ account credentials or systems.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • MANAGEMENT SECURITY Section 1. The Federation hereby accepts liability for any damage to or loss of state property that is the proximate cause of action by striking employees of this bargaining unit, provided however, that liability under this section shall be restricted to include any alleged loss of revenue or other incidental or punitive damage sought by the Employer.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Payment Security To secure all of CAISO’s payment obligations to Owner under this Agreement, CAISO agrees to grant Owner a security interest and lien in the following collateral (collectively, the “Collateral”): (a) all past, present and future accounts and other amounts Responsible Utility owes CAISO at any time pursuant to Section 41 of the CAISO Tariff attributable to invoices submitted by Owner under this Agreement (collectively, the “Accounts”), (b) the RMR Owner Facility Trust Account, all funds in the RMR Owner Facility Trust Account at any time, and all funds paid on account of any Accounts, (c) all proceeds of the Collateral, if any, and (d) all of CAISO’s right, title and interest in the Collateral. CAISO represents and warrants to Owner that (a) CAISO has the authority to grant such security interest, (b) CAISO will have good, marketable and exclusive title to all of the Collateral, (c) such security interest and lien will at all times be a valid, enforceable and first-priority lien on the Collateral, and (d) such security interest will be duly perfected by the filing of a financing statement under the California Uniform Commercial Code describing the Collateral in the office of the Secretary of State of California and the delivery of a written notice of Owner’s security interest to the bank with which the RMR Owner Facility Trust Account is maintained. If CAISO defaults on its obligation to pay under this Agreement, Owner shall be entitled to enforce such securityinterest, to exercise its rights in the Collateral, to collect the Accounts from Responsible Utility, to collect all funds in the RMR Owner Facility Trust Account, and to exercise all other rights and remedies under the California Uniform Commercial Code. CAISO agrees to promptly execute and deliver all financing statements and other documents Owner reasonably requests, including but not limited to a written notice of Owner’s security interest in the Collateral to the bank with which the RMR Owner Facility Trust Account is maintained, in order to maintain, perfect and enforce such security interest.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

Time is Money Join Law Insider Premium to draft better contracts faster.