OPERATIONAL TECHNOLOGY SYSTEMS Sample Clauses

OPERATIONAL TECHNOLOGY SYSTEMS. OWNER agrees that the effectiveness of operational technology systems (“OT Systems”) and features designed, recommended or assessed by CONSULTANT are dependent upon OWNER’s continued operation and maintenance of the OT Systems in accordance with all standards, best practices, laws, and regulations that govern the operation and maintenance of the OT Systems. OWNER shall be solely responsible for operating and maintaining the OT System in accordance with applicable industry standards (i.e. ISA, NIST, etc.) and best practices, which generally include but are not limited to, cyber security policies and procedures, documentation and training requirements, continuous monitoring of assets for tampering and intrusion, periodic evaluation for asset vulnerabilities, implementation and update of appropriate technical, physical, and operational standards, and offline testing of all software/firmware patches/updates prior to placing updates into production. Additionally, OWNER recognizes and agrees that OT Systems are subject to internal and external breach, compromise, and similar incidents. Security features designed, recommended or assessed by CONSULTANT are intended to reduce the likelihood that OT Systems will be compromised by such incidents. However, CONSULTANT does not guarantee that OWNER’s OT Systems are impenetrable and OWNER agrees to waive any claims against CONSULTANT resulting from any such incidents that relate to or affect OWNER’s OT Systems.
AutoNDA by SimpleDocs
OPERATIONAL TECHNOLOGY SYSTEMS. OWNER agrees that the effectiveness of operational technology systems (“OT Systems”) and features designed, recommended or assessed by ENGINEER are dependent upon OWNER’s continued operation and maintenance of the OT Systems in accordance with all standards, best practices, laws, and regulations that govern the operation and maintenance of the OT Systems. OWNER shall be solely responsible for operating and maintaining the OT System in accordance with applicable industry standards (i.e. ISA, NIST, etc.) and best practices, which generally include but are not limited to, cyber security policies and procedures, documentation and training requirements, continuous monitoring of assets for tampering and intrusion, periodic evaluation for asset vulnerabilities, implementation and update of appropriate technical, physical, and operational standards, and offline testing of all software/firmware patches/updates prior to placing updates into production. Additionally, OWNER recognizes and agrees that OT Systems are subject to internal and external breach, compromise, and similar incidents. Security features designed, recommended or assessed by ENGINEER are intended to reduce the likelihood that OT Systems will be compromised by such incidents.

Related to OPERATIONAL TECHNOLOGY SYSTEMS

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Curriculum Development This includes the analysis and coordination of textual materials; constant review of current literature in the field, some of which are selected for the college library collection, the preparation of selective, descriptive materials such as outlines and syllabi; conferring with other faculty and administration on curricular problems; and, the attendance and participation in inter and intra-college conferences and advisory committees.

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

  • Information Systems Acquisition Development and Maintenance Security of System Files. To protect City Information Processing Systems and system files containing information, Service Provider will ensure that access to source code is restricted to authorized users whose specific job function necessitates such access.

  • Computer Systems (a) Servicer to operate systems The Servicer shall operate and maintain systems capable of providing data processing, management information and other related information technology requirements to enable it to carry out the Services.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.