Browse
Search
2014-528-E Library - CERVIS Technologies for Volunteer Management $2,250
OrangeCountyNC
>
Board of County Commissioners
>
Contracts and Agreements
>
General Contracts and Agreements
>
2010's
>
2014
>
2014-528-E Library - CERVIS Technologies for Volunteer Management $2,250
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
5/25/2017 3:02:23 PM
Creation date
10/13/2014 11:37:09 AM
Metadata
Fields
Template:
BOCC
Date
10/13/2014
Meeting Type
Work Session
Document Type
Contract
Agenda Item
Manager signed
Amount
$2,250.00
Document Relationships
R 2014-528 Library - CERVIS Technologies for volunteer management
(Linked To)
Path:
\Board of County Commissioners\Contracts and Agreements\Contract Routing Sheets\Routing Sheets\2014
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
16
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
DocuSign Envelope ID: 1 E8BDD1 D-A826-4FDB-AB97-5EE804B7DCCB <br /> Access is provided based on the principle of least required privilege and is immediately <br /> revoked when no longer required. <br /> 29. What methods does the cloud provider use to destroy information, when so authorized? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. However, <br /> CERVIS will use secure erasure technology to accomplish this activity. <br /> 30. What is the cloud provider's patch management policy/methods? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. However, <br /> CERVIS will patch vulnerabilities based on criticality as assessed by our security teams. <br /> 31. How does the cloud provider defend against malware, including but not limited to <br /> viruses, bots, spyware, spam,phishing and pharming? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. However, <br /> CERVIS is protected with commercially accepted security practices including, Anti- <br /> Virus software,Network firewalls, host-based firewalls, network intrusion prevention, <br /> host-based intrusion prevention, Database firewalls, SSL encryption of data in motion, <br /> AES encryption of data at rest, encrypted VLANs and regularly scheduled vulnerability <br /> and web application security assessments. <br /> 32. What system hardening strategies are employed by the cloud provider? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. <br /> 33. How does the cloud provider perform security testing, including logging, correlation, <br /> intrusion detection, intrusion prevention, file integrity monitoring, time synchronization, <br /> security assessments,penetration testing? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. <br /> 34. What technologies and methods does the cloud vendor provide for strong authentication? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. <br /> 35. Provide any other comments and explanations: <br /> Click here to enter text. <br /> ^os <br /> J <br />
The URL can be used to link to this page
Your browser does not support the video tag.