EXTERNAL SECURITY Sample Clauses

EXTERNAL SECURITY. Vendor must attach to this document reasonable evidence that their system is secure from external hacking and attacks. Devices such as firewalls and technologies such as NAT are the minimum requirements. Active IDS or similar technology is preferred. Agree: Yes No
AutoNDA by SimpleDocs
EXTERNAL SECURITY. Pear Deck service is hosted and protected by Google Cloud Computing
EXTERNAL SECURITY. Thrively’s external security environment includes SPI firewalls and TLS/SSL encryption.
EXTERNAL SECURITY. Barobo follows NIST Cybersecurity Framework Version 1.1.
EXTERNAL SECURITY. Discovery Education has a comprehensive vulnerability management program that includes regular automated scans, and a suite of cybersecurity tools including endpoint protection and firewalls, with 24/7 monitoring provided by a Managed Security Services Provider (MSSP).
EXTERNAL SECURITY. Section 1.1: School passwords are not distributed by Canyon Creek Software. Teacher passwords may be emailed to teachers if they submit a forgotten password request. Administration passwords are distributed via an Egnyte secure portal document.
EXTERNAL SECURITY. We use industry-standard Secure Sockets Layer (SSL) encryption software to help protect your information from loss, theft, misuse, unauthorized access, disclosure, alteration, and destruction. All user data is hosted by Xxxxxx, a Salesforce company; ObjectRocket, a Rackspace company; and Amazon Web Services. Heroku, ObjectRocket, and Amazon Web Services use SSL encryption software. These third parties are well-known, established providers, who are bound to practice adequate security measures and to use your information solely as it pertains to the provision of their services.
AutoNDA by SimpleDocs
EXTERNAL SECURITY. All IOP systems have installed firewalls, password protected servers and antivirus softwa
EXTERNAL SECURITY. Seesaw routinely conducts 3rd party security audits to verify the security and integrity of
EXTERNAL SECURITY. We maintain administrative, technical, and physical safeguards to protect against the unauthorized use, access, or disclosure of personal information. Although this is not an exhaustive list of measures we take to keep your information safe, here is a list of some of our practices: We use socket layer technology (SSL/TLS) to encrypt information you enter when using the Service. We use encryption technology (AES-256) and salted hashing to encrypt information in motion and at rest. The Closegap Service is hosted on servers within the United States through a third-party service within nondescript facilities that employ extensive security practices, including but not limited to, a 24/7 security system, video surveillance, intrusion detection systems, and locked cage areas. These facilities utilize ISO 27001 and are FISMA certified. We automatically delete inactive student accounts after 12 months. We regularly review our information collection, storage, and processing practices.
Time is Money Join Law Insider Premium to draft better contracts faster.