Information and System Security Sample Clauses

Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with the Information Services Board Security Policy, Standards and Guidelines, the Use of DIS Network policy attached hereto as Schedule D, and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, self help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of Purchaser’s network, system or data.
AutoNDA by SimpleDocs
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with Washington State’s OCIO’s and CTS’s security policies, as well as any other policy of Washington State that is still in effect, which may include the Information Services Board Security Policy, Standards and Guidelines, and the CTS Site and Security Policy attached hereto as Exhibit C, and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, self-help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of Purchaser’s network, system or data. Vendor Commitments, Warranties and Representations. Any written commitment by Vendor within the scope of this Contract shall be binding upon Vendor. Failure of Vendor to fulfill such a commitment may constitute breach and shall render Vendor liable for damages under the terms of this Contract. For purposes of this section, a commitment by Vendor includes: (i) Prices, discounts, and options committed to remain in force over a specified period of time; and (ii) any warranty or representation made by Vendor in its Response (if any) or contained in any Vendor or manufacturer publications, written materials, schedules, charts, diagrams, tables, descriptions, other written representations, and any other communication medium accompanying or referred to in its Response, or used to effect the sale to Purchaser.
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with the Office of the Chief Information Officer (OCIO) Security Policy, Standards and Guidelines, the Use of CTS Network policy attached hereto as Exhibit C, complete annual security awareness training provided by Purchaser’s organization and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) access of any system; 2) any electronic transmission of code or data; 3) prevention of unauthorized access; and 4) not downloading or accessing unapproved systems, programs, code, websites; self-help code, unauthorized code, or other data without the written permission of the Purchaser.
Information and System Security. Notwithstanding any other provision in the Agreement, Provider, its Provider Agents and Provider Staff represent and warrant to Customer that it will adhere to the data security requirements set forth in the Agreement, including this Article 17 (Confidential Information; Customer Data), any and all Customer Policies, Schedule 9 (Information and System Security Requirements), and Schedule 14 (Data Privacy). Prior to performing any Services, Provider Agents and Provider Staff who may access Customer’s premises, Customer Systems, Customer Resources, and/or Confidential Information of Customer, including Customer Data, will confirm Confidential Juniper – IBM, MSA, dated 12-31-2018 MA-IB-00136-2018 Confidential Treatment Requested by Juniper Networks, Inc. in writing (electronically or in any other manner), which confirmation is auditable and sufficient to ensure that each of them is aware of and will comply with the provisions of the Agreement (including Customer Policies) concerning access protection and data/software security. Upon request by Customer, Provider will confirm that each such Person has provided such confirmation. Failure of Provider, Provider Agents or Provider Staff to comply with the provisions of the Agreement will be deemed a breach and may result, among other things, in Customer restricting the offending Provider Staff from access to Customer premises, Customer Systems, Customer Confidential Information and Customer Data, and/or immediate termination of the Agreement. Without limiting the foregoing, if Provider’s failure to comply with its responsibilities under the Information and System Security requirements under this Agreement results in (A) a Security Incident involving the disclosure or improper or unauthorized Processing of Customer Data or destructive acts on Systems or (B) an actual Critical or High-Severity Security Incident, each as defined under Customer’s Incident Response Plan, such non-compliance will be deemed a material breach.
Information and System Security. Servicer shall provide the Services in conformance with the respective Servicee’s terms and conditions set forth in Annex C.
Information and System Security. Contractor acknowledges and understands that access to DIS’ computer networks may be necessary to perform the work under this Contract, and as a result DIS has placed or may place special confidence and trust in the Contractor in providing such access. Contractor acknowledges and understands that any access to DIS’ computer networks shall be limited, restricted and conditioned upon Contractor’s compliance with certain DIS policies and practices. Contractor warrants that it will perform all work for or on behalf of DIS in full compliance with the Information Services Board Security Policy, Standards and Guidelines, the Use of DIS Networks Policy attached hereto as Schedule B, and any other security documents and best practices provided by DIS (“Security Policies”). Contractor, having agreed upon DIS’ Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, Self Help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of DIS’ network, system or data.
Information and System Security 
AutoNDA by SimpleDocs

Related to Information and System Security

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Information Systems The Official Agency in conjunction with the Authority will meet the relevant requirements of Articles 131 to 136 of Regulation (EU) 2017/625 and Implementing Regulation (EU) 2019/1715 as appropriate to the Official Agency. The Official Agency shall record appropriate data in the Official Agency Premises Inspection database (OAPI), which will be further developed over the life of the contract. Data should be entered into the database on an ongoing basis but shall be entered within one month of the activity taking place, unless otherwise agreed with the Authority.

  • INFORMATION AND DATA 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation as Local Traffic under the Interconnection Attachment.

  • Why We Collect Information and For How Long We are collecting your data for several reasons: · To better understand your needs and provide you with the services you have requested; · To fulfill our legitimate interest in improving our services and products; · To send you promotional emails containing information we think you may like when we have your consent to do so; · To contact you to fill out surveys or participate in other types of market research, when we have your consent to do so; · To customize our website according to your online behavior and personal preferences. The data we collect from you will be stored for no longer than necessary. The length of time we retain said information will be determined based upon the following criteria: the length of time your personal information remains relevant; the length of time it is reasonable to keep records to demonstrate that we have fulfilled our duties and obligations; any limitation periods within which claims might be made; any retention periods prescribed by law or recommended by regulators, professional bodies or associations; the type of contract we have with you, the existence of your consent, and our legitimate interest in keeping such information as stated in this Policy.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Information and Services Required of the Owner § 3.1.1 The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Time is Money Join Law Insider Premium to draft better contracts faster.