Common use of Minimum Security Requirements Clause in Contracts

Minimum Security Requirements. A General Computing Environment: CalHR and Departments shall comply with all of State Fund's requirements in relation to the security of the State Fund Facilities, including the State Fund computing environment. CalHR and Department Personnel shall execute all documents generally required by State Fund for access to State Fund's computing environment or other restricted access areas. CalHR and Departments agree that any and all security measures may be changed from time-to-time, and further agree to abide by the then-current security measures, as they are provided to CalHR. B System Access: CalHR and Departments represent and warrant to State Fund that they shall not alter any hardware or software security residing on State Fund's hardware or systems, including allowing non-read only access. CalHR and Departments further represent and warrant to State Fund that they shall not allow unauthorized traffic to pass into State Fund's networks. If CalHR or Departments do allow unauthorized traffic to pass into State Fund's networks, State Fund may immediately terminate such access in addition to any other remedies that State Fund may have under this Agreement. C Network Connections: CalHR and Departments agree to allow State Fund to perform network assessments of any CalHR or Department connections to State Fund's networks on a schedule reasonably required by State Fund. In the event a network connection is created between the Parties, Departments agree to maintain an alert status regarding all vulnerabilities and security patches or corrective actions by subscribing to an industry-recognized service, such as CERT or CIAC. CalHR understands that should a State Fund assessment reveal inappropriate or inadequate security based on State Fund’s requirements for security, State Fund may, in addition to other remedies it may have under this Agreement, remove CalHR and Department access to the State Fund network until CalHR and Departments satisfactorily comply with the applicable security requirements. D Electronic Authentication:

Appears in 4 contracts

Samples: Master Agreement, Master Agreement, Master Agreement

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.