IT Security Sample Clauses

IT Security. Development and implementation of management, operational, and technical security controls required by agencies to assure desired levels of protection for IT systems and data are achieved (e.g., establishment of policy/procedures in support of Federal IT security requirements, conduct risk assessments to identify threats/vulnerabilities for existing/planned systems; support Federal mandates for measuring and reporting compliance, perform certification and accreditation (C&A) activities; provide training services to promote awareness and knowledge of compliance responsibilities for Federal IT security requirements).
AutoNDA by SimpleDocs
IT Security. (a) Contractor has an information security program to maintain physical, technical, administrative, and organizational safeguards that comply with:
IT Security. Whinstone will install a firewall and implement an IT security policy to prevent unauthorized access physically or remotely, viruses and ransomware. However, the Customer shall have the right to install its own firewall and implement its own security policies in the place of or in addition to Whinstone as mutually agreed to by both parties.
IT Security. (a) Service Recipient shall cause all of its personnel, employees, officers, contractors, consultants or other agents (collectively, the “Recipient Personnel”) having access to the Provider Systems to comply with all documented security guidelines applicable to Service Provider’s and its Subsidiaries’ personnel, employees, officers, contractors, consultants or other agents generally (including physical security, network access, data security and privacy guidelines and similar policies) of Service Provider and shall not knowingly tamper with, compromise or circumvent any security or audit measures employed by Service Provider. Service Recipient shall ensure that such access shall be made by such Recipient Personnel only as required in connection with, or as specifically contemplated by the performance, delivery or receipt of a Service hereunder.
IT Security. The Supplier shall: ❑ Ensure it is and remains aware of the Client’s IT Security Policy, guidelines and protocols, and, or; ❑ Comply with the Client’s IT Security Policy, guidelines and protocols issued by the Client from time to time when accessing or using the Client’s IT Systems (which it may only do with the consent of the Client) and, or; ❑ Not connect any of its/their IT equipment to the Client’s Systems, not make any unauthorised adaptations to the Client’s Systems without written authorisation from the Client, and; ❑ Not download any unlicensed software onto the Client’s Systems, and; ❑ Not use the Client’s Systems for anything other than the provision of Services pursuant to this Agreement, and; ❑ Take all reasonable precautions in accordance with Best Industry Practice to avoid introducing any Viruses into the Client’s Systems or otherwise corrupting the Client’s (or its clients’) data, and shall indemnify ARC for all Losses incurred by ARC and/or the Client arising out of the Supplier’s failure to comply with its obligations related to IT security stated in this Agreement or any deliberate or negligent act or omission of the Supplier or its Consultants that introduces a Virus into the Client’s Systems or corrupts the Client’s (or its clients’) data.
IT Security. 16.1 The Manager shall maintain appropriate IT security in line with industry standards and if necessary comply with any Company IT Security Policy, the details of which shall be made available to the Manager including any revisions or updates.
IT Security. 15.1 PLATIT equipment can be connected to the internet for the purpose of remote diagnostics and data analysis. It is recommended to connect the equipment only during the time of remote diagnostics to the internet. The BUYER is responsible for protecting the operating system of the PLATIT equipment and the network through which the PLATIT equipment is connected to the internet against cyber-attacks (e.g., malicious software, hacks, encryptions, data loss). PLATIT excludes liability for damages and consequential damages in connection with cyber-attacks. In addition to online accessibility, PLATIT equipment provides ports to load data onto the units (e.g., USB-stick). It is the BUYER’S duty to ensure that data transferred via such media is free of malicious software and compatible with the operating system and PLATIT software installed on the PLATIT system.
IT Security. The Sellers, their Affiliates and the Acquired Company have implemented commercially reasonable measures within their direct or indirect control to protect the confidentiality, integrity and security of the applicable Acquired IT Assets (and all information stored or contained therein or transmitted thereby) against any unauthorized use, access, interruption, modification or corruption. The Sellers and their Affiliates have established and maintained appropriate disaster recovery plans, procedures and backup equipment and facilities (collectively, the “Disaster Recovery Plans”) of a scope consistent in all material respects with (a) customary industry practice in the event of any disaster, emergency or persistent equipment or telecommunications failure affecting the Business or its customers, (b) all applicable Laws, and (c) all Material Contracts. The Sellers and their Affiliates carry out periodic audits and tests of the Disaster Recovery Plans and otherwise have materially complied with the Disaster Recovery Plans. Except as disclosed on Schedule 3.22 of the Seller Disclosure Schedule, there have been (i) no failures or other substandard performance of any of (A) the IT Assets used by or on behalf of the Sellers, their Affiliates or the Acquired Company in connection with the Business and (B) the Acquired IT Assets, in each case of (A) and (B), which have caused any material disruption to the Business, and (ii) to the Knowledge of the Sellers, no material unauthorized intrusions or breaches of the security of such IT Assets described in the foregoing clauses (A) and (B).
IT Security. Note: IT Security This should be considered in conjunction with the definition of IT Security Management System. Depending on the nature of the Data and the technical sharing arrangements, the parties may wish to specify further in this Clause how the Data must be kept secure. If the parties include technical specifications, IT security, mandatory security policies or other schedules or annexes, these should be considered in conjunction with Clause 1.2 (Interpretation). The parties each undertake to implement and, during the Term, continuously operate an IT Security Management System. If the Data Consumer becomes aware of any misuse of any Data, or any security breach in connection with this Agreement that could compromise the security or integrity of the Data or otherwise adversely affect the Data Provider, the Data Consumer shall, at the Data Consumer's expense, promptly notify the Data Provider and fully co-operate with the Data Provider to remedy the issue as soon as reasonably practicable. Confidentiality
Time is Money Join Law Insider Premium to draft better contracts faster.