Sentences with phrase «identify unauthorized attempts»

For site security purposes and to ensure that this service remains available to all users, The Doherty Relationship Institute, LLC uses software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
Security For site security purposes, OnPoint Legal Research employs software programs to monitor network traffic that identifies unauthorized attempts to upload or change information, or otherwise cause damage.

Not exact matches

The regulation does not specify the form that the program must take, but requires that it be «designed to perform the following core cybersecurity functions:» (1) identify internal and external cyber risks by, at a minimum, identifying the Nonpublic Information stored on the Covered Entity's Information Systems, the sensitivity of such Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting obligations.
It is also clever enough to identify unauthorized access attempts by sensing the light - reflected surfaces and detecting subtle facial movements.
a b c d e f g h i j k l m n o p q r s t u v w x y z