{"component": "clause", "props": {"groups": [{"snippet": "All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. \u2022 Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (\u00a7 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (\u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with \u2587\u2587\u2587\u2587\u2587. \u2022 NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines.", "samples": [{"hash": "igw7ICMDp3u", "uri": "/contracts/igw7ICMDp3u#application-access", "label": "Software Maintenance and Database Hosting Services Agreement", "score": 35.0591201782, "published": true}, {"hash": "7AeqTsx5XIi", "uri": "/contracts/7AeqTsx5XIi#application-access", "label": "Diagnostic Testing Services Agreement", "score": 31.0536632538, "published": true}, {"hash": "6MdhK0XwkFX", "uri": "/contracts/6MdhK0XwkFX#application-access", "label": "Contract for Electronic Records Management System", "score": 30.0878677368, "published": true}], "snippet_links": [{"key": "the-internet", "type": "clause", "offset": [27, 39]}, {"key": "security-controls", "type": "clause", "offset": [52, 69]}, {"key": "access-to-the-application", "type": "clause", "offset": [81, 106]}, {"key": "not-approved", "type": "definition", "offset": [120, 132]}, {"key": "by-the-county", "type": "clause", "offset": [142, 155]}, {"key": "risk-assessment", "type": "definition", "offset": [159, 174]}, {"key": "service-providers", "type": "definition", "offset": [188, 205]}, {"key": "covered-services", "type": "definition", "offset": [229, 245]}, {"key": "as-required-by", "type": "clause", "offset": [300, 314]}, {"key": "hipaa-security-rule", "type": "definition", "offset": [315, 334]}, {"key": "security-management", "type": "definition", "offset": [336, 355]}, {"key": "the-risk", "type": "definition", "offset": [401, 409]}, {"key": "assessment-methodology", "type": "definition", "offset": [410, 432]}, {"key": "based-on", "type": "definition", "offset": [434, 442]}, {"key": "upon-request", "type": "definition", "offset": [554, 566]}, {"key": "compliance-with-hipaa", "type": "clause", "offset": [667, 688]}, {"key": "security-safeguards", "type": "clause", "offset": [748, 767]}, {"key": "national-institute-of-standards-and-technology", "type": "definition", "offset": [781, 827]}], "size": 19, "hash": "e6c3ae94d1ae3c36677385b81f138edd", "id": 1}, {"snippet": "All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county.", "samples": [{"hash": "jZrzENCXaiK", "uri": "/contracts/jZrzENCXaiK#application-access", "label": "Phlebotomy and Laboratory Testing Services Contract", "score": 35.371181488, "published": true}, {"hash": "3EeT6MWN9u8", "uri": "/contracts/3EeT6MWN9u8#application-access", "label": "Digital Health Solution Services Agreement", "score": 35.3629684448, "published": true}, {"hash": "b6mBj0qQExr", "uri": "/contracts/b6mBj0qQExr#application-access", "label": "Software and Professional Services Agreement", "score": 32.893863678, "published": true}], "snippet_links": [{"key": "the-internet", "type": "clause", "offset": [27, 39]}, {"key": "security-controls", "type": "clause", "offset": [52, 69]}, {"key": "access-to-the-application", "type": "clause", "offset": [81, 106]}, {"key": "not-approved", "type": "definition", "offset": [120, 132]}, {"key": "by-the-county", "type": "clause", "offset": [142, 155]}], "size": 9, "hash": "c8c9c101b1aa78a564da6dc7e8058485", "id": 2}, {"snippet": "Customer may access the ClearGov Apps via Customer\u2019s Account to utilize the functionality provided within such ClearGov Apps; and", "samples": [{"hash": "9U8UR7O1chB", "uri": "/contracts/9U8UR7O1chB#application-access", "label": "Service Agreement", "score": 33.0690536499, "published": true}, {"hash": "gD2JYUVX6Zm", "uri": "/contracts/gD2JYUVX6Zm#application-access", "label": "Service Agreement", "score": 32.5243186951, "published": true}, {"hash": "ytR3GNOhck", "uri": "/contracts/ytR3GNOhck#application-access", "label": "Service Agreement", "score": 31.9924068451, "published": true}], "snippet_links": [{"key": "customer-may", "type": "clause", "offset": [0, 12]}, {"key": "cleargov-apps", "type": "definition", "offset": [24, 37]}], "size": 5, "hash": "68723daf1d6d6f81fce7c5fdce83620a", "id": 3}, {"snippet": "All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. \u2022 Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (\u00a7 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (\u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/publications/nistpubs/800-30- rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with OCHCA. \u2022 NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines. County of Orange Health Care Agency Page 43 MA-042-17011367", "samples": [{"hash": "aWZscKSZJ7q", "uri": "/contracts/aWZscKSZJ7q#application-access", "label": "Contract for Electronic Health Record System Maintenance and Support", "score": 31.1720581055, "published": true}, {"hash": "fHMMdzD07W9", "uri": "/contracts/fHMMdzD07W9#application-access", "label": "Contract for Electronic Health Record System Maintenance and Support", "score": 30.8668060303, "published": true}], "snippet_links": [{"key": "the-internet", "type": "clause", "offset": [27, 39]}, {"key": "security-controls", "type": "clause", "offset": [52, 69]}, {"key": "access-to-the-application", "type": "clause", "offset": [81, 106]}, {"key": "not-approved", "type": "definition", "offset": [120, 132]}, {"key": "by-the-county", "type": "clause", "offset": [142, 155]}, {"key": "risk-assessment", "type": "definition", "offset": [159, 174]}, {"key": "service-providers", "type": "definition", "offset": [188, 205]}, {"key": "covered-services", "type": "definition", "offset": [229, 245]}, {"key": "as-required-by", "type": "clause", "offset": [300, 314]}, {"key": "hipaa-security-rule", "type": "definition", "offset": [315, 334]}, {"key": "security-management", "type": "definition", "offset": [336, 355]}, {"key": "the-risk", "type": "definition", "offset": [401, 409]}, {"key": "assessment-methodology", "type": "definition", "offset": [410, 432]}, {"key": "based-on", "type": "definition", "offset": [434, 442]}, {"key": "upon-request", "type": "definition", "offset": [555, 567]}, {"key": "compliance-with-hipaa", "type": "clause", "offset": [668, 689]}, {"key": "security-safeguards", "type": "clause", "offset": [749, 768]}, {"key": "national-institute-of-standards-and-technology", "type": "definition", "offset": [782, 828]}, {"key": "county-of-orange", "type": "definition", "offset": [848, 864]}, {"key": "health-care-agency", "type": "definition", "offset": [865, 883]}], "size": 3, "hash": "6df211e5559856bcbf6b28029d481b74", "id": 4}, {"snippet": "Provider shall make the Application(s) available over either the Internet or Customer\u2019s intranet to allow the End User to electronically and remotely access the Application(s). You shall provide at your own expense, all necessary telephone lines, Internet connections, equipment, software (including a compatible Web browser), and services for you to effectively access the Application(s). You are responsible for upgrading and configuring your internal systems (e.g., network or Intranet settings, Internet routing, fire walls, and Web browsers) to be and remain compatible with and optimize the performance of the Application(s). You acknowledge that the availability and performance of the Application(s) may be subject to interruption or delay due to causes beyond the reasonable control of Provider. The Application(s) are not the \"system of record\" for financial information (e.g., balances, transactions, etc.), but rather merely a means to access information. The \u201csystem of record\u201d is maintained at the credit card processor.", "samples": [{"hash": "8GARrXPbJMi", "uri": "/contracts/8GARrXPbJMi#application-access", "label": "End User License Agreement", "score": 25.3285427094, "published": true}], "snippet_links": [{"key": "provider-shall", "type": "clause", "offset": [0, 14]}, {"key": "the-internet", "type": "clause", "offset": [61, 73]}, {"key": "the-end-user", "type": "clause", "offset": [106, 118]}, {"key": "telephone-lines", "type": "clause", "offset": [230, 245]}, {"key": "internet-connections", "type": "clause", "offset": [247, 267]}, {"key": "compatible-web-browser", "type": "clause", "offset": [302, 324]}, {"key": "services-for", "type": "clause", "offset": [331, 343]}, {"key": "responsible-for", "type": "clause", "offset": [398, 413]}, {"key": "internal-systems", "type": "definition", "offset": [445, 461]}, {"key": "web-browsers", "type": "clause", "offset": [533, 545]}, {"key": "the-performance", "type": "clause", "offset": [593, 608]}, {"key": "you-acknowledge", "type": "clause", "offset": [632, 647]}, {"key": "availability-and-performance", "type": "clause", "offset": [657, 685]}, {"key": "subject-to", "type": "definition", "offset": [715, 725]}, {"key": "control-of", "type": "definition", "offset": [784, 794]}, {"key": "system-of-record", "type": "clause", "offset": [837, 853]}, {"key": "financial-information", "type": "definition", "offset": [859, 880]}, {"key": "access-information", "type": "definition", "offset": [948, 966]}, {"key": "credit-card-processor", "type": "definition", "offset": [1012, 1033]}], "size": 1, "hash": "4f8968f4780276921c632ac6ed05cfa3", "id": 5}, {"snippet": "When applicable to those specific Deliverables, any software or application must be installed onto the intended server, other device, or otherwise completed and delivered without preserving any TSGS access or backdoors, unless an SOW explicitly states otherwise. If TSGS requires access to a server provide Updates, TSGS shall provide adequate notice to Trade Algo, and Trade Algo shall facilitate such access. TSGS represents and warrants that all Deliverables will be free from any program, routine or device designed to delete, disable, deactivate, interfere with, prevent access to, or otherwise harm any software, program, data, device, system or service, including without limitation, any \u2018time bomb\u2019, virus, drop dead device, malicious logic, worm, Trojan horse or trap or back door.", "samples": [{"hash": "7f4DT0mYUuk", "uri": "/contracts/7f4DT0mYUuk#application-access", "label": "Master Service Agreement (TA Fintech Inc.)", "score": 35.7761802673, "published": true}], "snippet_links": [{"key": "applicable-to", "type": "clause", "offset": [5, 18]}, {"key": "specific-deliverables", "type": "clause", "offset": [25, 46]}, {"key": "other-device", "type": "definition", "offset": [120, 132]}, {"key": "access-to", "type": "definition", "offset": [280, 289]}, {"key": "notice-to", "type": "clause", "offset": [344, 353]}, {"key": "all-deliverables", "type": "clause", "offset": [445, 461]}, {"key": "including-without-limitation", "type": "clause", "offset": [661, 689]}, {"key": "trojan-horse", "type": "definition", "offset": [756, 768]}, {"key": "back-door", "type": "definition", "offset": [780, 789]}], "size": 1, "hash": "47d34f51d48db01bd78fe8389b40c4b6", "id": 6}, {"snippet": "All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. \u2022 Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA County of Orange Page 45 of 53 MA-042-19011809 Health Care Agency File Folder No. C018820 Security Rule, Security Management (\u00a7 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (\u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with \u2587\u2587\u2587\u2587\u2587. \u2022 NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines.", "samples": [{"hash": "f1MimxixDgC", "uri": "/contracts/f1MimxixDgC#application-access", "label": "Professional Services", "score": 33.298992157, "published": true}], "snippet_links": [{"key": "the-internet", "type": "clause", "offset": [27, 39]}, {"key": "security-controls", "type": "clause", "offset": [52, 69]}, {"key": "access-to-the-application", "type": "clause", "offset": [81, 106]}, {"key": "not-approved", "type": "definition", "offset": [120, 132]}, {"key": "by-the-county", "type": "clause", "offset": [142, 155]}, {"key": "risk-assessment", "type": "definition", "offset": [159, 174]}, {"key": "service-providers", "type": "definition", "offset": [188, 205]}, {"key": "covered-services", "type": "definition", "offset": [229, 245]}, {"key": "as-required-by", "type": "clause", "offset": [300, 314]}, {"key": "county-of-orange", "type": "definition", "offset": [321, 337]}, {"key": "health-care-agency", "type": "definition", "offset": [368, 386]}, {"key": "security-rule", "type": "clause", "offset": [411, 424]}, {"key": "security-management", "type": "definition", "offset": [426, 445]}, {"key": "the-risk", "type": "definition", "offset": [491, 499]}, {"key": "assessment-methodology", "type": "definition", "offset": [500, 522]}, {"key": "based-on", "type": "definition", "offset": [524, 532]}, {"key": "upon-request", "type": "definition", "offset": [644, 656]}, {"key": "compliance-with-hipaa", "type": "clause", "offset": [757, 778]}, {"key": "security-safeguards", "type": "clause", "offset": [838, 857]}, {"key": "national-institute-of-standards-and-technology", "type": "definition", "offset": [871, 917]}], "size": 1, "hash": "58f752c61661c5138d8749dad920a3fe", "id": 7}, {"snippet": "All systems accessible via the internet must employ security controls to prevent access to the application via an asset not approved or owned by the county. \u2022 Risk Assessment. Application Service Providers hosting data for HIPAA covered services must conduct an accurate and thorough Risk Assessment as required by HIPAA Security Rule, Security Management (\u00a7 164.308(a)(1)). Further, they must follow the risk assessment methodology, based on the latest version of NIST SP 800-30 (\u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf). Upon request, the Risk Assessment findings and remediation strategy must be shared with \u2587\u2587\u2587\u2587\u2587. \u2022 NIST. To ensure compliance with HIPAA, Application Service Providers shall implement appropriate security safeguards by following National Institute of Standards and Technology (NIST) guidelines. 12 Policies\u200c Vendors must have formal, published IT security policies that address how they manage and maintain the internal security posture of their own or sub-contracted infrastructure. The vendor shall also clearly demonstrate that additional security features are in place to protect systems and data in the unique environment of the service provider model: namely, security issues associated with storing County- owned data on a remote server that is not under direct County control and the necessity of transferring this data over an untrusted network. Vendors must provide, to the extent permissible, all relevant security policies and procedures to the County for review and validation. All documentation must be provided in electronic format for the County\u2019s review. These policies must include, but not be limited to, the following: \u25aa IT Staff Usage Agreement. All vendor employees performing services for the County must sign and agree to an IT usage agreement within their own organization as part of an overall security training and awareness program. At a minimum, vendor employees must sign a statement of understanding within their own organization regarding Internet dangers, IT security, and IT ethics and best practices, \u25aa IT Security Policies and Procedures.", "samples": [{"hash": "aLjNGjnFBJh", "uri": "/contracts/aLjNGjnFBJh#application-access", "label": "Contract for Behavioral Health System Transformation", "score": 34.6320915222, "published": true}], "snippet_links": [{"key": "the-internet", "type": "clause", "offset": [27, 39]}, {"key": "security-controls", "type": "clause", "offset": [52, 69]}, {"key": "access-to-the-application", "type": "clause", "offset": [81, 106]}, {"key": "not-approved", "type": "definition", "offset": [120, 132]}, {"key": "by-the-county", "type": "clause", "offset": [142, 155]}, {"key": "risk-assessment", "type": "definition", "offset": [159, 174]}, {"key": "service-providers", "type": "definition", "offset": [188, 205]}, {"key": "covered-services", "type": "definition", "offset": [229, 245]}, {"key": "as-required-by", "type": "clause", "offset": [300, 314]}, {"key": "hipaa-security-rule", "type": "definition", "offset": [315, 334]}, {"key": "security-management", "type": "definition", "offset": [336, 355]}, {"key": "the-risk", "type": "definition", "offset": [401, 409]}, {"key": "assessment-methodology", "type": "definition", "offset": [410, 432]}, {"key": "based-on", "type": "definition", "offset": [434, 442]}, {"key": "upon-request", "type": "definition", "offset": [554, 566]}, {"key": "compliance-with-hipaa", "type": "clause", "offset": [667, 688]}, {"key": "security-safeguards", "type": "clause", "offset": [748, 767]}, {"key": "national-institute-of-standards-and-technology", "type": "definition", "offset": [781, 827]}, {"key": "security-posture", "type": "clause", "offset": [972, 988]}, {"key": "the-vendor-shall", "type": "clause", "offset": [1036, 1052]}, {"key": "security-features", "type": "clause", "offset": [1094, 1111]}, {"key": "in-place", "type": "definition", "offset": [1116, 1124]}, {"key": "systems-and-data", "type": "clause", "offset": [1136, 1152]}, {"key": "the-service-provider", "type": "definition", "offset": [1182, 1202]}, {"key": "security-issues", "type": "definition", "offset": [1218, 1233]}, {"key": "associated-with", "type": "definition", "offset": [1234, 1249]}, {"key": "to-the-extent", "type": "clause", "offset": [1429, 1442]}, {"key": "relevant-security", "type": "definition", "offset": [1460, 1477]}, {"key": "to-the-county", "type": "definition", "offset": [1502, 1515]}, {"key": "for-review", "type": "clause", "offset": [1516, 1526]}, {"key": "electronic-format", "type": "definition", "offset": [1581, 1598]}, {"key": "for-the-county", "type": "clause", "offset": [1599, 1613]}, {"key": "usage-agreement", "type": "definition", "offset": [1702, 1717]}, {"key": "vendor-employees", "type": "definition", "offset": [1723, 1739]}, {"key": "services-for", "type": "clause", "offset": [1751, 1763]}, {"key": "agree-to", "type": "clause", "offset": [1789, 1797]}, {"key": "security-training-and-awareness", "type": "clause", "offset": [1872, 1903]}, {"key": "employees-must", "type": "clause", "offset": [1934, 1948]}, {"key": "statement-of-understanding", "type": "clause", "offset": [1956, 1982]}, {"key": "best-practices", "type": "definition", "offset": [2072, 2086]}, {"key": "it-security-policies-and-procedures", "type": "clause", "offset": [2090, 2125]}], "size": 1, "hash": "a28d3099146a4debc0ad71ec1640c322", "id": 8}, {"snippet": "Oranj\u2122 hereby grants you permission to use the Application as set forth in these Terms of Service, provided that: (i) your use of the Application as permitted is solely for your personal, noncommercial use in connection with your Oranj\u2122 Account; (ii) you will not use the Application in any way that is unlawful, misleading, malicious, or discriminatory; (iii) you will not do anything that could disable, overburden, or impair the proper working of the Application (such as a denial of service attack); and (iv) you will otherwise comply with the terms and conditions of these Terms of Service. You cannot:\n1. access, tamper with, or use non-public areas of the Application, Oranj\u2019s computer systems, or the technical delivery systems of Oranj\u2019s providers;\n2. attempt to probe, scan, or test the vulnerability of any system or network or breach any security or authentication measures;\n3. interfere with, or attempt to interfere with, the access of any user, host, or network, including, without limitation, sending a virus, overloading, flooding, spamming, or request-bombing the Application;\n4. impersonate or misrepresent your affiliation with any person or entity;\n5. violate any local, state, national or international law or regulation;\n6. transmit any material that is fraudulent, abusive, harassing, tortious, defamatory, vulgar, pornographic, obscene, libelous, invasive of another's privacy, hateful, or racially, ethnically, or otherwise objectionable. Oranj\u2122 Account Requirements \u2022 In order to use the Application (Oranj\u2122 App), you will have to create an account. \u2022 Oranj Accounts are only available to users age 18 and older. \u2022 By registering with \u2587\u2587\u2587\u2587\u2587, you represent that you are able to form a binding contract and are not a person barred by any laws from using the Application. \u2022 You are not allowed to use another user\u2019s Oranj Account. \u2022 When creating your Oranj Account, you must provide accurate and complete information. You agree to provide true, accurate, current and complete information about yourself in all required fields of the registration form. If any of your information changes, you agree to update your registration information as soon as possible. If \u2587\u2587\u2587\u2587\u2587 suspects that your registration violates these Terms of Service, your Oranj Account may be subject to suspension or termination, and you may be barred from using the Application. \u2022 You are solely responsible for the activity that occurs on and in your Oranj Account, and you must keep your password secure. You may change your password at any time by updating your account settings. In addition, you agree to immediately notify Oranj of any unauthorized use of your password or any other breach of security. Oranj cannot and will not be liable for any loss or damage arising from your failure to secure your Oranj Account.", "samples": [{"hash": "abn9tYjWNcA", "uri": "/contracts/abn9tYjWNcA#application-access", "label": "Terms of Service", "score": 23.0348796844, "published": true}], "snippet_links": [{"key": "permission-to-use", "type": "clause", "offset": [25, 42]}, {"key": "these-terms-of-service", "type": "definition", "offset": [75, 97]}, {"key": "provided-that", "type": "definition", "offset": [99, 112]}, {"key": "use-of-the-application", "type": "clause", "offset": [123, 145]}, {"key": "your-personal", "type": "clause", "offset": [173, 186]}, {"key": "noncommercial-use", "type": "definition", "offset": [188, 205]}, {"key": "in-connection-with", "type": "clause", "offset": [206, 224]}, {"key": "denial-of-service-attack", "type": "definition", "offset": [477, 501]}, {"key": "terms-and-conditions-of", "type": "clause", "offset": [548, 571]}, {"key": "tamper-with", "type": "definition", "offset": [619, 630]}, {"key": "public-areas", "type": "definition", "offset": [643, 655]}, {"key": "computer-systems", "type": "clause", "offset": [684, 700]}, {"key": "the-technical", "type": "clause", "offset": [705, 718]}, {"key": "delivery-systems", "type": "definition", "offset": [719, 735]}, {"key": "authentication-measures", "type": "definition", "offset": [862, 885]}, {"key": "without-limitation", "type": "clause", "offset": [989, 1007]}, {"key": "person-or-entity", "type": "clause", "offset": [1152, 1168]}, {"key": "law-or-regulation", "type": "clause", "offset": [1225, 1242]}, {"key": "account-requirements", "type": "clause", "offset": [1472, 1492]}, {"key": "in-order-to", "type": "clause", "offset": [1495, 1506]}, {"key": "available-to", "type": "definition", "offset": [1603, 1615]}, {"key": "you-represent", "type": "clause", "offset": [1669, 1682]}, {"key": "form-a", "type": "definition", "offset": [1704, 1710]}, {"key": "binding-contract", "type": "definition", "offset": [1711, 1727]}, {"key": "a-person", "type": "clause", "offset": [1740, 1748]}, {"key": "using-the-application", "type": "clause", "offset": [1773, 1794]}, {"key": "not-allowed", "type": "definition", "offset": [1806, 1817]}, {"key": "you-must-provide", "type": "clause", "offset": [1891, 1907]}, {"key": "accurate-and-complete-information", "type": "clause", "offset": [1908, 1941]}, {"key": "to-provide", "type": "clause", "offset": [1953, 1963]}, {"key": "required-fields", "type": "clause", "offset": [2035, 2050]}, {"key": "registration-form", "type": "definition", "offset": [2058, 2075]}, {"key": "information-changes", "type": "clause", "offset": [2092, 2111]}, {"key": "your-registration-information", "type": "clause", "offset": [2133, 2162]}, {"key": "as-soon-as-possible", "type": "definition", "offset": [2163, 2182]}, {"key": "subject-to", "type": "definition", "offset": [2284, 2294]}, {"key": "suspension-or-termination", "type": "definition", "offset": [2295, 2320]}, {"key": "responsible-for", "type": "clause", "offset": [2389, 2404]}, {"key": "the-activity", "type": "definition", "offset": [2405, 2417]}, {"key": "keep-your-password-secure", "type": "clause", "offset": [2473, 2498]}, {"key": "at-any-time", "type": "clause", "offset": [2529, 2540]}, {"key": "account-settings", "type": "definition", "offset": [2558, 2574]}, {"key": "in-addition", "type": "clause", "offset": [2576, 2587]}, {"key": "unauthorized-use-of-your-password", "type": "clause", "offset": [2634, 2667]}, {"key": "breach-of-security", "type": "definition", "offset": [2681, 2699]}, {"key": "loss-or-damage", "type": "definition", "offset": [2745, 2759]}, {"key": "failure-to-secure", "type": "clause", "offset": [2778, 2795]}], "size": 1, "hash": "4551430171c0d11f7d7383d4cbe773ad", "id": 9}, {"snippet": "Customer may access the SwiftComply Modules via Customer\u2019s Account to utilize the functionality provided within such SwiftComply Modules; and", "samples": [{"hash": "7vMtiIoQIdY", "uri": "/contracts/7vMtiIoQIdY#application-access", "label": "Service Agreement", "score": 35.4943618774, "published": true}], "snippet_links": [{"key": "customer-may", "type": "clause", "offset": [0, 12]}], "size": 1, "hash": "e33d09fc45f0ed0ca600393a70b1184d", "id": 10}], "next_curs": "ClsSVWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjcLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhthcHBsaWNhdGlvbi1hY2Nlc3MjMDAwMDAwMGEMogECZW4YACAA", "clause": {"parents": [["service-usage-licenses", "Service Usage Licenses"], ["cleargov-license", "ClearGov License"], ["expenditure-limit", "Expenditure Limit"], ["compliance", "COMPLIANCE"], ["functional-requirements", "Functional Requirements"]], "children": [["authorized-users", "Authorized Users"]], "title": "Application Access", "size": 44, "id": "application-access", "related": [["information-access", "Information Access", "Information Access"], ["union-access", "Union Access", "Union Access"], ["additional-submissions-information-access", "Additional Submissions \u2013 Information Access", "Additional Submissions \u2013 Information Access"], ["service-access", "Service Access", "Service Access"], ["site-access", "Site Access", "Site Access"]], "related_snippets": [], "updated": "2025-07-10T04:27:38+00:00"}, "json": true, "cursor": ""}}