{"component": "clause", "props": {"groups": [{"snippet_links": [{"key": "information-on", "type": "clause", "offset": [27, 41]}, {"key": "mobile-devices", "type": "clause", "offset": [69, 83]}, {"key": "computer-configuration", "type": "clause", "offset": [134, 156]}, {"key": "prior-to", "type": "definition", "offset": [328, 336]}, {"key": "unauthorized-software", "type": "clause", "offset": [461, 482]}, {"key": "required-by", "type": "definition", "offset": [566, 577]}, {"key": "system-administrator", "type": "clause", "offset": [607, 627]}, {"key": "administrative-accounts", "type": "clause", "offset": [662, 685]}, {"key": "administrative-activities", "type": "definition", "offset": [702, 727]}, {"key": "user-accounts", "type": "clause", "offset": [755, 768]}, {"key": "other-purposes", "type": "definition", "offset": [777, 791]}, {"key": "computing-device", "type": "definition", "offset": [823, 839]}, {"key": "business-operations", "type": "definition", "offset": [856, 875]}, {"key": "security-requirements", "type": "definition", "offset": [949, 970]}, {"key": "my-responsibilities", "type": "clause", "offset": [1002, 1021]}, {"key": "i-understand", "type": "definition", "offset": [1109, 1121]}, {"key": "workforce-members", "type": "definition", "offset": [1153, 1170]}, {"key": "unauthorized-purpose", "type": "clause", "offset": [1220, 1240]}, {"key": "print-name", "type": "definition", "offset": [1242, 1252]}, {"key": "school-of-medicine", "type": "clause", "offset": [1266, 1284]}, {"key": "job-title", "type": "definition", "offset": [1285, 1294]}, {"key": "student-signature", "type": "definition", "offset": [1313, 1330]}, {"key": "copy-provided", "type": "clause", "offset": [1338, 1351]}, {"key": "agreement-to", "type": "clause", "offset": [1443, 1455]}, {"key": "original-agreement", "type": "clause", "offset": [1483, 1501]}, {"key": "academic-file", "type": "clause", "offset": [1531, 1544]}, {"key": "signed-agreements", "type": "definition", "offset": [1551, 1568]}, {"key": "policies-and-standards", "type": "definition", "offset": [1601, 1623]}], "samples": [{"hash": "gd9ZwggXUfQ", "uri": "/contracts/gd9ZwggXUfQ#computer-security", "label": "Privacy, Confidentiality, and Information Security Agreement", "score": 27.9484539032, "published": true}, {"hash": "5Hf9xR9eZ9U", "uri": "/contracts/5Hf9xR9eZ9U#computer-security", "label": "Privacy, Confidentiality, and Information Security Agreement", "score": 27.061548233, "published": true}, {"hash": "VUeWMquoeQ", "uri": "/contracts/VUeWMquoeQ#computer-security", "label": "Privacy, Confidentiality, and Information Security Agreement", "score": 26.6837902069, "published": true}], "size": 11, "snippet": "I will store all protected information on secured systems, encrypted mobile devices, or other secure media. \u2022 I will not change my UW computer configuration unless specifically approved to do so. \u2022 I will not disable or alter the anti-virus and/or firewall software on my UW computer. \u2022 I will log out or lock computer sessions prior to leaving a computer. \u2022 I will use only licensed and authorized software; o I will not download, install or run unlicensed or unauthorized software. \u2022 I will use administrative permissions only when I am approved to do so and when required by job function; o If I perform system administrator function(s) I must use designated administrative accounts only for system administrative activities and use non-administrative user accounts for all other purposes. \u2022 If I use a personally-owned computing device for UW Medicine business operations, I will not connect it to a UW Medicine network unless it meets the same security requirements as a UW Medicine-owned device. My responsibilities involving protected information continue even after my separation from UW Medicine and I understand that it is unlawful for former workforce members to use or disclose protected information for any unauthorized purpose. Print Name: Department: School of Medicine Job Title: Visiting Medical Student Signature: Date: Copy provided on by \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 Date Name supervisor, manager or designee Signature Provide copy of this Agreement to the workforce member. File original Agreement in departmental personnel or academic file. (All signed Agreements must be maintained for 6 years) Policies and Standards References:", "hash": "89e034e2ba54eca0cb2448d7f1eca1ae", "id": 6}, {"snippet_links": [{"key": "contractor-shall", "type": "clause", "offset": [0, 16]}, {"key": "access-data", "type": "definition", "offset": [41, 52]}, {"key": "operating-system-and-software", "type": "clause", "offset": [69, 98]}], "samples": [{"hash": "gXT0EDPYqeb", "uri": "/contracts/gXT0EDPYqeb#computer-security", "label": "Professional Services", "score": 34.6308555603, "published": true}, {"hash": "4HIovTK3X0F", "uri": "/contracts/4HIovTK3X0F#computer-security", "label": "Prevention and Promotion Client Services Contract", "score": 34.2474937439, "published": true}, {"hash": "iEEKqFxaFDl", "uri": "/contracts/iEEKqFxaFDl#computer-security", "label": "Prevention and Promotion Client Services Contract", "score": 34.1316604614, "published": true}], "size": 11, "snippet": "Contractor shall maintain computers that access Data by ensuring the operating system and software are updated and patched monthly, such that they remain secure from known vulnerabilities. Contractor computer device(s) must also be installed with an Anti-Malware solution and signatures updated no less than monthly.", "hash": "ceb4b6672a6ae87a3a6e6e811e48e558", "id": 5}, {"snippet_links": [{"key": "the-employee", "type": "clause", "offset": [7, 19]}, {"key": "employment-with-the-company", "type": "definition", "offset": [22, 49]}, {"key": "employee-agrees", "type": "clause", "offset": [55, 70]}, {"key": "computer-resources", "type": "clause", "offset": [113, 131]}, {"key": "employee-has", "type": "clause", "offset": [187, 199]}, {"key": "agrees-to", "type": "clause", "offset": [249, 258]}, {"key": "comply-with-the", "type": "clause", "offset": [259, 274]}, {"key": "policies-and-procedures", "type": "definition", "offset": [285, 308]}], "samples": [{"hash": "cZly6hJwLMj", "uri": "/contracts/cZly6hJwLMj#computer-security", "label": "Employment Agreement (Nutex Health, Inc.)", "score": 36.7234764099, "published": true}, {"hash": "jzDDCCd6oJX", "uri": "/contracts/jzDDCCd6oJX#computer-security", "label": "Employment Agreement (Nutex Health, Inc.)", "score": 35.2395629883, "published": true}, {"hash": "98UjXoOAzGw", "uri": "/contracts/98UjXoOAzGw#computer-security", "label": "Employment Agreement (Nutex Health, Inc.)", "score": 34.8535232544, "published": true}], "size": 18, "snippet": "During the Employee\u2019s employment with the Company, the Employee agrees only to use Company\u2019s and its Affiliate\u2019s computer resources (both on and off the Company\u2019s premises) for which the Employee has been authorized and granted access. The Employee agrees to comply with the Company\u2019s policies and procedures concerning computer security.", "hash": "880084d11d6499a68ef32f81c75a3391", "id": 1}, {"snippet_links": [{"key": "agrees-to", "type": "clause", "offset": [13, 22]}, {"key": "the-employer", "type": "definition", "offset": [35, 47]}, {"key": "policies-and-procedures", "type": "definition", "offset": [50, 73]}], "samples": [{"hash": "gepV4q5YGPI", "uri": "/contracts/gepV4q5YGPI#computer-security", "label": "Employment Agreement (Astrana Health, Inc.)", "score": 36.1978111267, "published": true}, {"hash": "iZdomS0SVBJ", "uri": "/contracts/iZdomS0SVBJ#computer-security", "label": "Employment Agreement (Astrana Health, Inc.)", "score": 35.2587280273, "published": true}, {"hash": "8mo3uBs2fYa", "uri": "/contracts/8mo3uBs2fYa#computer-security", "label": "Employment Agreement (Astrana Health, Inc.)", "score": 35.2587280273, "published": true}], "size": 16, "snippet": "The Employee agrees to comply with the Employer\u2019s policies and procedures concerning computer security.", "hash": "eeb7c3695aed82181f295c9f3643806b", "id": 2}, {"snippet_links": [{"key": "employment-with-the-company", "type": "definition", "offset": [34, 61]}, {"key": "computer-resources", "type": "clause", "offset": [75, 93]}, {"key": "of-the-company", "type": "clause", "offset": [111, 125]}, {"key": "to-the-extent", "type": "clause", "offset": [196, 209]}, {"key": "agrees-to", "type": "clause", "offset": [232, 241]}, {"key": "comply-with-the", "type": "clause", "offset": [242, 257]}, {"key": "policies-and-procedures", "type": "definition", "offset": [268, 291]}, {"key": "executive-further", "type": "definition", "offset": [322, 339]}, {"key": "company-confidential-information", "type": "definition", "offset": [406, 438]}, {"key": "third-party-information", "type": "definition", "offset": [442, 465]}, {"key": "storage-devices", "type": "clause", "offset": [491, 506]}, {"key": "not-limited", "type": "clause", "offset": [523, 534]}, {"key": "electronic-media", "type": "definition", "offset": [539, 555]}, {"key": "in-accordance-with", "type": "clause", "offset": [647, 665]}, {"key": "record-retention-and-destruction", "type": "clause", "offset": [680, 712]}], "samples": [{"hash": "kMAqwunMryw", "uri": "/contracts/kMAqwunMryw#computer-security", "label": "Executive Employment Agreement (Capstone Companies, Inc.)", "score": 29.2354545593, "published": true}, {"hash": "a0YEdOIJEn5", "uri": "/contracts/a0YEdOIJEn5#computer-security", "label": "Executive Employment Agreement (Capstone Companies, Inc.)", "score": 29.2354545593, "published": true}, {"hash": "lpm7oXyMPQJ", "uri": "/contracts/lpm7oXyMPQJ#computer-security", "label": "Executive Employment Agreement (Capstone Companies, Inc.)", "score": 27.2231349945, "published": true}], "size": 10, "snippet": "Executive agrees that, during his employment with the Company, he will use computer resources (both on and off of the Company's premises) for which Executive has been granted access and then only to the extent authorized. Executive agrees to comply with the Company's policies and procedures concerning computer security. Executive further acknowledges that Executive will not alter, remove or destroy any Company Confidential Information or Third Party Information stored on any electronic storage devices, including, but not limited to, electronic media stored on servers, local hard drives, lap-tops, \"PDAs\" or any other similar devices except in accordance with the Company's record retention and destruction policy.", "hash": "3c2636929f3b765d281e389eebbf4010", "id": 7}, {"snippet_links": [{"key": "the-executive", "type": "clause", "offset": [7, 20]}, {"key": "employment-with-the-company", "type": "definition", "offset": [23, 50]}, {"key": "computer-resources", "type": "clause", "offset": [115, 133]}, {"key": "agrees-to", "type": "clause", "offset": [253, 262]}, {"key": "comply-with-the", "type": "clause", "offset": [263, 278]}, {"key": "policies-and-procedures", "type": "definition", "offset": [289, 312]}], "samples": [{"hash": "cAcpbho4XhH", "uri": "/contracts/cAcpbho4XhH#computer-security", "label": "Employment Agreement (Black Hawk Acquisition Corp)", "score": 37.205338809, "published": true}, {"hash": "hsCaMhGLzT7", "uri": "/contracts/hsCaMhGLzT7#computer-security", "label": "Employment Agreement (Vesicor Therapeutics, Inc.)", "score": 37.1724853516, "published": true}, {"hash": "dNoBqzmIYhX", "uri": "/contracts/dNoBqzmIYhX#computer-security", "label": "Employment Agreement (Vesicor Therapeutics, Inc.)", "score": 37.1724853516, "published": true}], "size": 14, "snippet": "During the Executive\u2019s employment with the Company, the Executive agrees only to use Company\u2019s and its Affiliate\u2019s computer resources (both on and off the Company\u2019s premises) for which the Executive has been authorized and granted access. The Executive agrees to comply with the Company\u2019s policies and procedures concerning computer security.", "hash": "e52c888415c7ce361ff63390497d9832", "id": 3}, {"snippet_links": [{"key": "the-policy", "type": "clause", "offset": [6, 16]}, {"key": "conditions-of", "type": "clause", "offset": [63, 76]}, {"key": "you-are-required-to", "type": "clause", "offset": [104, 123]}, {"key": "comply-with", "type": "clause", "offset": [124, 135]}, {"key": "this-policy", "type": "definition", "offset": [136, 147]}, {"key": "person-or-company", "type": "definition", "offset": [226, 243]}, {"key": "the-authorization", "type": "clause", "offset": [307, 324]}, {"key": "reasonable-precautions", "type": "definition", "offset": [363, 385]}, {"key": "to-ensure", "type": "clause", "offset": [386, 395]}, {"key": "your-use-of-the-software", "type": "clause", "offset": [401, 425]}, {"key": "existing-software", "type": "clause", "offset": [460, 477]}], "samples": [{"hash": "l3ubZUJCt2A", "uri": "/contracts/l3ubZUJCt2A#computer-security", "label": "Employment Agreement (Cognos Inc)", "score": 21.0, "published": true}, {"hash": "ddvHp51Iph0", "uri": "/contracts/ddvHp51Iph0#computer-security", "label": "Employment Agreement (Cognos Inc)", "score": 21.0, "published": true}, {"hash": "aZr310qD8W9", "uri": "/contracts/aZr310qD8W9#computer-security", "label": "Employment Agreement (Cognos Inc)", "score": 21.0, "published": true}], "size": 12, "snippet": "It is the policy of Cognos to adhere strictly to the licensing conditions of any software that it uses. You are required to comply with this policy. You will not copy or distribute for your own use or for the use of any other person or company any software used or developed by Cognos without (a) obtaining the authorization of your supervisor and (b) taking all reasonable precautions to ensure that your use of the software neither corrupts nor destroys any existing software or data.", "hash": "bde0b0a2c65cd9b40b2230acf9573730", "id": 4}, {"snippet_links": [{"key": "employment-with-company", "type": "clause", "offset": [10, 33]}, {"key": "i-agree-to", "type": "clause", "offset": [35, 45]}, {"key": "computer-resources", "type": "clause", "offset": [69, 87]}, {"key": "to-the-extent", "type": "clause", "offset": [176, 189]}, {"key": "comply-with", "type": "clause", "offset": [213, 224]}, {"key": "policies-and-procedures", "type": "definition", "offset": [235, 258]}], "samples": [{"hash": "f7ALryiEbMG", "uri": "/contracts/f7ALryiEbMG#computer-security", "label": "Employment Agreement", "score": 29.3408622742, "published": true}, {"hash": "7wozb8zXYwZ", "uri": "/contracts/7wozb8zXYwZ#computer-security", "label": "Employment Agreement (Zai Lab LTD)", "score": 29.3258037567, "published": true}, {"hash": "gwKsBdTbsQd", "uri": "/contracts/gwKsBdTbsQd#computer-security", "label": "Employment Agreement (Zai Lab LTD)", "score": 28.6659812927, "published": true}], "size": 10, "snippet": "During my employment with Company, I agree to use only those Company computer resources (both on and off Company\u2019s premises) for which I have been granted access and then only to the extent authorized. I agree to comply with Company\u2019s policies and procedures concerning computer security.", "hash": "55274a93a1accbcbe6f2b51427183873", "id": 8}, {"snippet_links": [{"key": "minimum-order", "type": "clause", "offset": [3, 16]}, {"key": "services-covered-by-this", "type": "clause", "offset": [40, 64]}, {"key": "functional-area", "type": "clause", "offset": [65, 80]}, {"key": "the-contractor", "type": "clause", "offset": [115, 129]}, {"key": "maximum-order", "type": "clause", "offset": [191, 204]}, {"key": "any-order", "type": "definition", "offset": [251, 260]}, {"key": "written-notice", "type": "definition", "offset": [310, 324]}, {"key": "days-after", "type": "definition", "offset": [344, 354]}, {"key": "services-ordered", "type": "clause", "offset": [416, 432]}, {"key": "of-orders", "type": "clause", "offset": [446, 455]}], "samples": [{"hash": "lDOHXlhxSzm", "uri": "/contracts/lDOHXlhxSzm#computer-security", "label": "Contract", "score": 22.1704311371, "published": true}, {"hash": "z1kBfLqvr0", "uri": "/contracts/z1kBfLqvr0#computer-security", "label": "Contract", "score": 17.0, "published": true}, {"hash": "i0LTcPpHbQy", "uri": "/contracts/i0LTcPpHbQy#computer-security", "label": "Contract", "score": 17.0, "published": true}], "size": 7, "snippet": "a. Minimum order. When the NRC requires services covered by this functional area in an amount of less than $5,000, the Contractor is not obligated to furnish those services under the BPA.\nb. Maximum order. The Contractor is not obligated to honor:\n1. Any order in excess of $250,000 if the CO is provided with written notice (within 10 working days after issuance) stating the Contractor's intent not to provide the services ordered.\n2. A series of orders within 30 days that together exceed $500,000.", "hash": "803a318a48398c8008daf9b0703ca659", "id": 9}, {"snippet_links": [{"key": "employee-of-consultant", "type": "clause", "offset": [43, 65]}, {"key": "telecommunication-resources", "type": "definition", "offset": [98, 125]}, {"key": "terms-of-this-agreement", "type": "clause", "offset": [141, 164]}, {"key": "consultant-agrees", "type": "clause", "offset": [166, 183]}, {"key": "employees-who", "type": "clause", "offset": [220, 233]}, {"key": "by-the-board", "type": "clause", "offset": [280, 292]}, {"key": "policies-and-guidelines", "type": "definition", "offset": [295, 318]}, {"key": "the-provisions-of", "type": "clause", "offset": [377, 394]}, {"key": "exhibit-c", "type": "definition", "offset": [395, 404]}, {"key": "water-board", "type": "definition", "offset": [430, 441]}, {"key": "incorporated-by-reference", "type": "clause", "offset": [486, 511]}], "samples": [{"hash": "gvjzEcEOyA9", "uri": "/contracts/gvjzEcEOyA9#computer-security", "label": "Consulting Agreement", "score": 33.2634086609, "published": true}, {"hash": "kqKBrRwUwmh", "uri": "/contracts/kqKBrRwUwmh#computer-security", "label": "Consulting Agreement", "score": 31.0717906952, "published": true}, {"hash": "38WQC1tI10n", "uri": "/contracts/38WQC1tI10n#computer-security", "label": "Consulting Agreement", "score": 28.1948184967, "published": true}], "size": 5, "snippet": "Consultant acknowledges that he, she or an employee of Consultant may use the Board\u2019s computer or telecommunication resources to fulfill the terms of this Agreement. Consultant agrees that he, she or any of Consultant\u2019s employees who are required to use such resources will abide by the Board\u2019s policies and guidelines governing the use of these resources and will comply with the provisions of Exhibit C, entitled \"Use of Denver Water Board Computer and Telecommunications Resources,\u201d incorporated by reference.", "hash": "a264dcf1ed86d51d1cddb6d74de1d19e", "id": 10}], "next_curs": "CloSVGoVc35sYXdpbnNpZGVyY29udHJhY3RzcjYLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ihpjb21wdXRlci1zZWN1cml0eSMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"title": "Computer Security", "children": [], "parents": [["confidential-information-non-solicitation-and-cooperation", "Confidential Information Non Solicitation and Cooperation"], ["confidential-information-nonsolicitation-and-cooperation", "Confidential Information Nonsolicitation and Cooperation"], ["confidential-information", "Confidential Information"], ["employee-obligations", "Employee Obligations"], ["survival-clauses", "Survival Clauses"]], "size": 172, "id": "computer-security", "related": [["server-security", "Server Security", "Server Security"], ["user-security", "User Security", "User Security"], ["cyber-security", "Cyber Security", "Cyber Security"], ["e7-security", "E7 Security", "E7 Security"], ["insurer-security", "Insurer security", "Insurer security"]], "related_snippets": [], "updated": "2026-03-19T05:56:49+00:00", "also_ask": ["What minimum security standards should be mandated to ensure enforceability?", "How can liability for security breaches be strategically allocated or limited?", "What are the most common pitfalls or ambiguities in computer security clauses?", "How do these provisions compare to industry best practices and regulatory requirements?", "What evidence is typically required in court to prove compliance or breach of a computer security clause?"], "drafting_tip": "Specify security standards, require regular audits, and mandate breach notification to ensure compliance, maintain accountability, and enable prompt response to threats.", "explanation": "The Computer Security clause establishes requirements and standards for protecting computer systems and data from unauthorized access, breaches, or other security threats. Typically, it obligates parties to implement appropriate technical and organizational measures, such as firewalls, encryption, and regular security audits, to safeguard sensitive information. This clause is essential for minimizing the risk of data breaches and ensuring compliance with relevant laws or industry standards, thereby protecting both parties from potential financial and reputational harm."}, "json": true, "cursor": ""}}