General Security Standards Sample Clauses

General Security Standards. At all times during the term of this Contract, Vendor shall maintain a level of security with regard to the Software Products’ system and County Data for which Vendor has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Vendor with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices.
AutoNDA by SimpleDocs
General Security Standards. At all times during the Term, Vendor shall maintain a level of security with regard to the Systems, Client Data, Client Software, and those Locations for which Vendor has agreed in this Agreement to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that maintained by the Client with regard to such Systems, Client Data, Client Software, and the Client’s facilities prior to the Service Commencement Date; (b) that maintained by Vendor with regard to its own systems, data, and facilities of a similar nature and import; and (c) that are common and prevalent in the IT industry and in accordance with best industry practices.
General Security Standards. At all times during the Term, Riskonnect shall maintain a level of security with regard to the RCMIS Systems and County Data for which Riskonnect has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Riskonnect with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices.
General Security Standards. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems) and networks used by or for Contractor to access County Data or otherwise in connection with the Services (“Contractor Systems”) and shall prevent unauthorized access to County Data through Contractor Systems. At all times during the term, Contractor shall maintain a level of security with regard to Contractor System and County Data for which Contractor has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices. Contractor shall maintain all appropriate administrative, physical, technical, and procedural safeguards to secure County Data from data breach, protect County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and the Services.
General Security Standards. At all times during the Term, Vendor shall maintain a level of security with regard to the Systems, Commonwealth Data, Commonwealth Software, and those Locations for which Vendor has agreed in Section 3.10 to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (i) that maintained by the Commonwealth with regard to such Systems, Commonwealth Data, Commonwealth Software, and the Commonwealth’s facilities prior to the Service Commencement Date; (ii) that maintained by Vendor with regard to its own systems, data, and facilities of a similar nature and import; and (iii) that are common and prevalent in the IT industry and in accordance with best industry practices.
General Security Standards. At all times during the Term, the Contractor shall maintain a level of security with regard to the Agenda System and County Data for which the Contractor has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by the Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices. Breach of Security: Any material breach or violation by the Contractor or its subcontractors, or the employees or agents of any of the foregoing, of the Security Policies, shall be deemed a material breach of a material obligation of the Contractor under this Contract, and any chronic or critical breach by the Contractor or its subcontractors, or the employees or agents of any of the foregoing, of the Security Policies, shall be deemed an incurable and material breach of a material obligation of the Contractor under this Contract, which may result in an immediate termination by the County for cause, pursuant to Section K herein.
General Security Standards. At all times during the Term, Contractor shall maintain a level of security with regard to the eGovernment Systems and County Data for which Contractor has agreed in this Agreement to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that were maintained by the County with regard to such eGovernment Systems and County Data as agreed to during the County/Contractor kick-off meeting; (b) that are maintained by Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (c) that are common and prevalent in the industry and in accordance with industry best practices.
AutoNDA by SimpleDocs
General Security Standards. Contractor will use industry standards and practice to prevent unauthorized access to County systems or County Data through the Software. At all times during the term, Contractor shall maintain a level of security with regard to the Contractor Systems that in all events is at least as secure as the levels of security that are common and prevalent in the industry and in accordance with industry standards and practices. Contractor shall maintain appropriate administrative, physical, technical, and procedural safeguards to secure County Data in Orange County Information Technology Page 31 of 122 Redline_MA-017-18010489 AssetWorks, LLC Folder No.:C003855 Computerized Maintenance Management System Contractor’s possession from data breach, protect such County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and the Services, to the extent not directly caused by County.
General Security Standards. At all times during the Term, Contractor shall maintain a level of security with regard to the eGovernment Systems and County Data for which Contractor has agreed in this Agreement to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that were maintained by the County with regard to such eGovernment Systems and County Data as agreed to during the County/Contractor kick-off meeting; (b) that are maintained by Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (c) that are common and prevalent in the industry and in accordance with industry best practices. Breach of Security Any material breach or violation by Contractor or its Subcontractors, or the employees or agents of any of the foregoing, or of the Security Policies and Principles, shall be deemed a material breach of a material obligation of Contractor under this Agreement, and any chronic or critical breach by Contractor or its Subcontractors, or the employees or agents of any of the foregoing, or of the Security Policies and Principles shall be deemed an incurable and material breach of a material obligation of Contractor under this Agreement. The Parties agree that for the purposes of this Section a breach shall only be deemed material if: (a) Contractor has failed to act in material accordance with the Security Policies and Principles or the security provisions of the procedures manual or the applicable terms of the Scope of Work; or (b) Contractor has failed to use industry best practices and methods in performing its obligations with respect to security services.

Related to General Security Standards

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • Property Standards Owner must maintain the Unit, and any common areas of the property accessible to the Tenant under the Lease, in decent, safe and sanitary condition and comply with all applicable state or local codes and requirements for rental properties. Upon notice by the Program Administrator following any inspection (whether conducted in-person or virtually in accordance with the Program guidelines), Owner will promptly correct any violations of Program requirements and this Contract. If the Owner fails to correct such violations, the Program Administrator may terminate this Contract and the Rental Assistance Payment even if the Tenant continues occupancy under the Lease. Owner/Representative Initials:

  • OMB Standards Unless specified otherwise within this agreement, the Subrecipient shall procure all materials, property, or services in accordance with the requirements of 24 CFR 84.40−48.

  • Contractor Standards Contractor shall comply with Contractor Standards provisions codified in the SDMC. Contractor understands and agrees that violation of Contractor Standards may be considered a material breach of the Contract and may result in Contract termination, debarment, and other sanctions.

  • Safety Standards Performance of the Contract for all commodities or contractual services must comply with requirements of the Occupational Safety and Health Act and other applicable State of Florida and federal requirements.

  • General Standards An Assistant Professor will be competent to teach in a particular field, will be current in the literature of that field, and will seek to meet student needs in both the classroom and in non-classroom environments. However, an Assistant may be a junior member of the academic community, with little professional and/or teaching experience. Furthermore, an Assistant may have little experience in curriculum development, committee work, governance, professional and/or community service, etc. In short, an Assistant Professor generally will be new to tenure-track college teaching. For eligibility for promotion from Assistant to Associate Professor, the candidate must have served a minimum of four (4) years at the rank of Assistant Professor, and must show evidence that he/she has grown professionally and consistently has sought to meet student needs, in both the classroom and in non-classroom environments. A successful candidate for the rank of Associate Professor will have remained current in the field, and will have improved his/her teaching in some demonstrable way. He/she also will have demonstrated professional growth in one or more of the following ways: completion of additional appropriate course work (if applicable), attendance at professional conferences, service on campus and/or District committees, professional and/or community service, or, the production of some creative work. Evidence of professional growth will be drawn from a careful analysis of student evaluations and peer evaluations over a period of time, and from a critical reading of materials submitted by the candidate. For promotion from Associate to Professor, the candidate must have served a minimum of four (4) years at the rank of Associate Professor, and must show evidence that he/she has grown professionally to a point where he/she has mastered both a particular field of knowledge and the teaching of that knowledge. A successful candidate must show evidence that he/she consistently has sought to meet student needs, in both the classroom and non-classroom environments. A Professor should be a senior member of the faculty, one who has such substantial experience, knowledge, and skill that he/she could mentor junior faculty in his/her area of expertise. A Professor will have demonstrated all the same kinds of achievements and attributes necessary for promotion to the Associate Professor rank, but in addition will demonstrate that he/she is a leader in some appropriate sense. Evidence of professional growth and leadership will be drawn from a careful analysis of student evaluations and peer evaluations over a period of time, and from a critical reading of materials submitted by the candidate.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • ETHICAL STANDARDS a. Distributor and each of its sub-distributors will comply with the United States Foreign Corrupt Practices Act and without derogating from the generality of the foregoing, will not have its directors, officers or employees, directly or indirectly, offer, promise or pay any bribes or other improper payments for the purposes of promoting and/or selling Products to any individual, corporation, government official or agency or other entity. No gift, benefit or contribution in any way related to MEC or the promotion and/or sale of Products will be made to political or public officials or candidates for public office or to political organizations, regardless of whether such contributions are permitted by local laws.

  • Compliance with Standards Although the standards for workmanship, material, and equipment have been selected in these specifications as a basis of reference, standards and specifications of the other bank member countries and recommendations of standards international organizations will be acceptable provided they are substantially equivalent to the designated standards and provided furthermore that the contractor submits for approval detailed specifications which he proposes to use. Reference to brand names or catalog numbers if any in these specifications have been made only for that equipment for which it has been determined that a degree of standardization is necessary to maintain certain essential features. And in certain cases such references have also been made for purposes of convenience to specify the requirements, in either case offers of alternative goods, which have similar characteristics and provide performance and quality at lease equal to those specified are acceptable. If the contractor offers materials, equipment, design calculations or tests, which conform to standards other than those specified, full details of the differences between the proposed standards and that specified in so far as they affect the design or purpose of the equipment, are to be supplied by the contractor if called upon to do so by the engineer, where required by the engineer for approval purposes, the contractor shall supply, without charge, duplicate copies of the proposed standards with English translations of the relevant portions. The contractor shall have available in his place of business (or in his supplier’s works) the relevant copies of standards or codes used for the use of the Engineer.

  • Quality Standards Each Party agrees that the nature and quality of its products and services supplied in connection with the other Party's Marks will conform to quality standards set by the other Party. Each Party agrees to supply the other Party, upon request, with a reasonable number of samples of any Materials publicly disseminated by such Party which utilize the other Party's Marks. Each Party will comply with all applicable laws, regulations, and customs and obtain any required government approvals pertaining to use of the other Party's marks.

Time is Money Join Law Insider Premium to draft better contracts faster.