AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Ms power suite11/19/2023 ![]() Our consultancy and application services support the migration of workloads to the cloud. This helps reduce real estate footprint for office space, as well as minimising the impact of business travel. Our security, collaboration and application services enable our workforces and those of our clients to securely work from home and collaborate and share data. Solutions to help our clients reduce their carbon footprints largely focus on applying advances in technology to improve the energy efficiency of IT Platforms through migration to the cloud and by enabling secure home working. Unisys is committed to preserving the environment and have a number of strategies to do this, for our own business, our supply chain and our customers. Periodic simulated social engineering exercises are conducted to against specific departments or individuals based on a risk determination to enforce policy, with remedial training courses or exercises assigned if required. Additional advanced training is also provided for employees according to role. Completion of this training is online and completion is tracked. All employees complete mandatory basic level security training. Unisys Security Policy covers: Employee screening and background checks Acceptable use of corporate assets Data Classification Data Protection Internet and Email Data Backup Reporting Security Incidents BYOD Working Remotely Password Management and Security Awareness Training. Business units, subsidiaries and/or project teams are responsible for developing policies, standards and guidelines aligned to the particular requirements of their operations, jurisdictions and contracts respectively. Compliance with this policy is mandatory, and is the responsibility of each business unit. Misuse includes both deliberate and inadvertent actions. Infrastructure Office (CSIO) and is designed to protect Unisys, our employees, contractors, customers and other partnersįrom harm caused by the misuse of Unisys assets and our data. It is defined by the Corporate Security and Unisys world-wide information technology systems and the information they contain. Unisys Security Policy defines policies and processes for the protection of Information security policies and processes Except in the case of any emergency, Unisys will provide Client with electronic notice of planned Maintenance at least twenty-four (24) hours in advance of such maintenance. “Excused PowerSuite Downtime” means downtime that is caused by unavailability of a service due to exclusions or Client scheduled maintenance and take down of the PowerSuite Software to conduct scheduled file and data transfer and synchronization, maintenance and take down of related hosting equipment, software, and telecommunications equipment (such maintenance to occur at any reasonable time to minimize the impact on users). The “Actual Availability Level” of the PowerSuite Software will be measured using the following calculation: ((X/Y) x 100%)Where: X= Minutes that the PowerSuite Software is Available during the quarter plus minutes of Excused PowerSuite Downtime during thequarter and Y= Total minutes during the quarter. ![]() The PowerSuite Software will be materially operational and functional (i.e., capable of displaying and processing information as contemplated in the ordinary course of business) (“Available”) during any calendar quarter 99.5% of the time (the “Availability SLA”).
0 Comments
Read More
Leave a Reply. |