Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning.)
Regularly Monitor and Test Networks. MUIS will use industry standard practices to protect its telecommunications systems and any computer system or network device(s) it uses to provide services hereunder to access provider systems and networks. These controls will be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: o protecting against intrusions of operating systems or software o securing the computer systems and network devices
Regularly Monitor and Test Networks. 6.1 Perform regular tests on information systems (port scanning, virus scanning, internal/external vulnerability scanning). Ensure that issues identified via testing are remediated according to the issue severity (e.g. fix critical issues immediately, high severity in 15 days, etc.)
Regularly Monitor and Test Networks. Per NCC’s Information Security Policy, NCC will perform regular tests on information systems (port scanning, virus scanning, internal/external vulnerability scanning). Ensure that issues identified via testing are remediated according to the issue severity (e.g. fix critical issues immediately, high severity in 15 days, etc.). Logs will be maintained for 90 days online and 1 year archived. Audit trails will be enabled and active for systems and applications used to access, store, process, or transmit Credit Bureau Data establish a process for linking all access to such systems and applications. Use current best practices to protect telecommunications systems and any computer system or network device(s) used to provide Services hereunder to access Credit Bureau systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by:
Regularly Monitor and Test Networks. CLIENT understands and agrees that they must perform regular tests on information systems (port scanning, virus scanning, vulnerability scanning). Use current best practices to protect their telecommunications systems and any computer system or network device(s) used to provide services hereunder to access credit reporting agency systems and networks. These controls should be selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by: ● Protecting against intrusions ● Securing the computer systems and network devices ● Protecting against intrusions of operating systems or software
Regularly Monitor and Test Networks a. Tracking and monitoring access to TMUS's network resources and Company Data.