E7 Security Clause Samples
The E7 Security clause establishes the requirements and responsibilities related to maintaining the security of information, systems, or premises involved in the contract. Typically, this clause outlines the standards or protocols that must be followed to protect sensitive data, such as implementing access controls, encryption, or regular security audits. Its core practical function is to ensure that both parties take appropriate measures to prevent unauthorized access, data breaches, or other security incidents, thereby reducing the risk of loss or misuse of confidential information.
POPULAR SAMPLE Copied 1 times
E7 Security. The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.
E7 Security. The Contractor shall take all measures necessary to comply with the provisions of any enactment relating to security that may be applicable to the Contractor in the performance of the Services.
E7 Security. ▇▇▇ shall be responsible for maintaining the security of ▇▇▇’▇ premises in accordance with its standard security requirements. The Contractor shall comply with all reasonable security requirements of ▇▇▇ while on the Premises, and shall procure that all of its employees, agents, servants and sub-contractors shall likewise comply with such requirements.
E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.
E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures.
E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency.
E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows:
(a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and
(b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).
E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.
E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures.
E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency.
E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows:
E7 Security. The Provider shall take all measures necessary to comply with the provisions of any enactment relating to security that may be applicable to the Provider in the performance of the Services.
E7 Security. Clause Not Used E8 Intellectual Property Rights
E7 Security. E7.1 The Authority may give the Supplier upon request copies of its written security procedures.
E7.2 The Supplier shall, as an enduring obligation during the Term, use the latest versions of anti- virus programs available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
E7.3 Notwithstanding clause E7.2, if Malicious Software is found, the Parties shall co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of the Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency.
E7 Security. E7.1 The Service Provider shall comply with the terms of Schedule 8 (Information Assurance and Security) and Schedule 15 (Service Continuity Plan and Corporate Resolution Planning).
E7.2 The Service Provider shall, as an enduring obligation during the Contract Period, use the latest versions of anti-virus programs available from an industry accepted anti- virus software vendor to check for and delete Malicious Software from the ICT Environment.
E7 Security. E7.1-E7.2 [NOT USED]
