Network Security Management Sample Clauses

Network Security Management. Networks and network services are secured, for example by separation and segregation.
AutoNDA by SimpleDocs
Network Security Management. DoIT staff routinely become aware of advanced persistent threats (APTs), or generally hostile state actors attacking state and local governments, universities and other ICN constituents. DoIT will provide network security and managed services, including scanning for vulnerabilities on network systems, as further described in Appendix B, the terms and conditions of which are attached hereto and incorporated herein.
Network Security Management. The Supplier shall (and shall ensure that its Subcontractors shall) maintain the appropriate confidentiality, integrity, and availability of Lloyd’s Information, by: • utilising secure network architecture and operations; • ensuring that networks carrying Lloyd’s Information are designed, built, monitored, and managed according to industry standards, best practices and frameworks e.g. ISO27001, TOGAF, OWASP ITIL, etc. such that they enforce the required information security policy boundaries. These boundaries must prevent unauthorised access to Systems and Lloyd’s Systems or Lloyd’s Information by default, and allow only explicitly authorised and authenticated access. The Supplier shall (and shall ensure that its Subcontractors shall) ensure that anti-virus and firewall protection systems are implemented in relation to both internal and external traffic and ensure that: • firewall platforms are hardened; • penetration tests of firewall protected network connections are conducted by trained personnel on a regular basis; • firewalls have real-time logging and alerting capabilities; • intrusion detection systems are implemented where Internet connections exist; • access lists are implemented on network routers to restrict access to sensitive internal networks or servers. Remote support access shall be controlled via a secure gateway that implements the following controls: • strong authentication (e.g. two-factor authentication); • access via a secure gateway (e.g. a firewall or the Azure portal); • remote support accounts only enabled for the duration of troubleshooting activity; • all troubleshooting activity is logged and reviewed. The Supplier shall seek prior written Lloyd’s approval to use any Supplier provider of remote support of Supplier systems. Any such approved Subcontractor shall be subject to a contract between the Supplier and such Subcontractor detailing security requirements in relation to such support, and that access granted to the Subcontractor in order to provide such support is given with minimum privileges and revoked on completion. The Supplier shall develop and implement an appropriate internet, email and acceptable use policy and ensure that appropriate controls are in place and documented to prevent unauthorised download of software or web content by Supplier (or Subcontractor) personnel. The Supplier shall ensure that utility programs capable of overriding system and application controls shall be restricted and tightly controlled. T...
Network Security Management. 13.1.1 Network controls Defined in the Eight Technology Information Security Policy and security manual
Network Security Management. Physical Security - The GSP must provide a copy of its policy restricting physical access to all in-house facilities and equipment.
Network Security Management. 1. NautaDutilh manages and controls its networks and properly protects them against threats and maintains security for the information assets that use the network, including information assets that are transmitted.
Network Security Management. 4.1. Attack Prevention - WFS will employ adequate measures to protect the networks hosting information systems against or limit the effects of attacks by unauthorized users.
AutoNDA by SimpleDocs

Related to Network Security Management

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Account Management 15.1 The Contractor is required to provide a dedicated Strategic Account Manager who will be the main point of contact for the Authority. The Strategic Account Manager will:  Attend quarterly, or as otherwise agreed, review meetings with the Authority, in person at the Authority’s premises or other locations as determined by the Authority  Attend regular catch-up meetings with the Authority, in person or by telephone/videoconference  Resolve any on-going operational issues which have not been resolved by the Contractor or Account Manager(s) and therefore require escalation  Ensure that the costs involved in delivering the Framework are as low as possible, whilst always meeting the required standards of service and quality.

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

Time is Money Join Law Insider Premium to draft better contracts faster.