Urgency how soon we think the incident needs to be

Info icon This preview shows pages 5–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Urgency = How soon we think the Incident needs to be addressed. Asset = A device you own on the network that if compromised, could significantly and detrimentally impact your business. Examples of assets are web servers, databases or workstations. With our agreement, you will nominate to us which of your assets are critical or non-critical (and you must act reasonably in doing so). Although we may give you guidance on the categorising of your assets, you’re solely responsible for that categorisation. 3.9 We are solely responsible for rating your Incidents. This means that any security issue or attack blocked by another vendor’s product or signature, or by your own policy, is not automatically deemed to be an Incident. A ticket will not be created for that issue or event unless we have rated it in a way that requires a ticket to be created. 3.10 You can choose not to receive email or SMS alerts by changing your preferences on the Telstra Security Portal. What optional components are available? 3.11 You may request: (a) additional log and event storage capacity and retention periods; and (b) services to extract your logs from storage. If we agree to your request, we will confirm the applicable charges. How do you access your service? 3.12 You can access your Security Monitoring service via the Telstra Security Portal. 3.13 The Telstra Security Portal aims to let you do the following: Event monitoring, correlation and rating Incident notification View and track your rated Incidents. Raise a service request to view your archived Incidents. Generate reports on your Incidents. View expert assessment of your Incidents. TELSTRA CORPORATION LIMITED (ABN 33 051 775 556) | Managed Security Services Section was last changed on 24 August 2017 | TELSTRA UNRESTRICTED PAGE 5 OF 36
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
OUR CUSTOMER TERMS MANAGED SECURITY SERVICES SECTION What are the service limitations? 3.14 We don't promise that the Security Monitoring service will correctly detect and identify all: (a) Security Events or Incidents; (b) unauthorised access to your network; (c) viruses; (d) spam; or (e) other types of attacks or issues. 3.15 You must promptly tell us if you find limitations or issues with your Security Monitoring service. 3.16 You must give us at least 10 business days’ notice before any vulnerability or penetration testing occurs to your network. Term and termination 3.17 When you cancel your Security Monitoring service; (a) we will store your logs for up to 90 days from the date of cancellation (at your expense), unless you tell us in writing that you do not want us to do this; (b) you may request an extract of your logs during this 90 day period; (c) you must pay a fee for this extraction and we can confirm this fee on request; and (d) you will not be able to request an extract after this 90 day period.
Image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern