Network and Communications Security Sample Clauses

Network and Communications Security. 2.1 All Processor connectivity to Controller computing systems and/or networks and all attempts at same shall be only through Controller’s security gateways/firewalls and only through Controller-approved security procedures.
AutoNDA by SimpleDocs
Network and Communications Security. A. Asset Management. BNYM will maintain an inventory of its system components, hardware and software used to provide the services, and will review and update such inventory in accordance with the ISP.
Network and Communications Security. Markit shall:
Network and Communications Security. Each party shall deploy security controls in a multi-layered approach, including intrusion detection and anti-virus systems. All security control layers shall log and notify any unusual activity twenty-four (24) hours per day, three hundred sixty five (365) days a year. Administrators shall review logs regularly (at least monthly) and respond to alerts within a reasonable amount of time. Logs shall be archived onto a write once/read only media for a reasonable amount of time (consistent with commercially reasonable document retention policies) and be accessible for investigation purposes.
Network and Communications Security. A. Asset Management. BNY Mellon will maintain an inventory of its system components, hardware and software used to provide the services under the Agreement, and will review and update such inventory in accordance with the ISP.
Network and Communications Security. 2.1 Processor shall not access and will not permit unauthorized persons or entities to access Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization.
Network and Communications Security. 2.1 Except in the ordinary course of providing the System as anticipated under the Agreement, SunGard and its personnel will not access Customer computing systems and/or networks without Customer’s authorization and any such actual or attempted access shall be consistent with any such authorization.
AutoNDA by SimpleDocs
Network and Communications Security o At the Hosting Facility site, deploy multiple layers of defense, specifically firewalls, host/network-based intrusion detection and proxy services to increase the effort required to compromise network(s), system(s) or application(s) and to increase the probability that such attempts will be detected. o Configure firewalls, network routers, switches, load balancers, name servers, mail servers, and other network components in accordance with commercially reasonable industry standards. o Minimize the potential for external unauthorized access to Liberty Software systems through the use of firewalls, filtering routers, or other similar network segmentation devices. o All security monitoring systems including, but not limited to, firewalls and intrusion detection systems must be monitored 24 hours per day, 365 days per year.
Network and Communications Security. The Supplier must develop and implement network and communications security policies, procedures and technology to control and detect potential network and communications information security system issues and failures. At a minimum, Supplier must have:
Network and Communications Security. 3.1. All Poppulo connectivity to Customer information systems shall be through secured remote access mechanisms.
Time is Money Join Law Insider Premium to draft better contracts faster.