Operations Security Sample Clauses

Operations Security. Supplier must enable logging and monitoring on all operating systems, databases, applications, and security and network devices that are involved in providing Deliverables. Supplier will maintain anti-malware controls that are designed to protect systems from malicious software, including malicious software that originates from public networks. In addition, Supplier will use anti-malware software (of Industry Standard or better quality), maintain such software at the then current major release, purchase maintenance & support available from the vendor for such software, and promptly implement new releases and versions of such software.
AutoNDA by SimpleDocs
Operations Security. To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor shall cause an SSAE 18 SOC 2 Type 2 audit report to be conducted annually. The audit results and the Contractor’s plan for addressing or resolution of the audit results shall be shared with the State within sixty (60) days of the Contractor's receipt of the audit results. Further, on an annual basis, within 90 days of the end of the Contractor’s fiscal year, the Contractor shall transmit its annual audited financial statements to the State.
Operations Security. As applicable to the performance of any service pursuant to which the Contractor will receive or collect State Data, as outlined in a Statement of Work, or a Purchase Order, or any other form of ordering document hereunder, the Contractor shall work with the State to determine the appropriate security model for any such services. Further, on an annual basis, within 90 days of the end of the Contractor’s fiscal year, the Contractor shall transmit its annual audited financial statements to the State.
Operations Security. 12.4.2.1 On the Commercial Operations Date, the Seller shall provide to the Purchaser security ("Operations Security") in the amount of [] to ensure the completion and proper operation and maintenance of the Plant. The Operations Security shall be:
Operations Security. The Contractor shall cause an SSAE 16 SOC 2 Type 2 audit report to be conducted annually. The audit results and the Contractor’s plan for addressing or resolution of the audit results shall be shared with the State within sixty (60) days of the Contractor's receipt of the audit results. Further, on an annual basis, within 90 days of the end of the Contractor’s fiscal year, the Contractor shall transmit its annual audited financial statements to the State.
Operations Security. The Company shall have an established change management system in place for making changes to business processes, information processing facilities and systems. The change management system shall include tests and reviews before changes are implemented, such as procedures to handle urgent changes, roll back procedures to recover from failed changes, logs that show, what has been changed, when and by whom. The Company shall implement malware protection to ensure that any software used for Company’s provision of the Services to the Customer is protected from malware. The Company shall make backup copies of critical information and test back-up copies to ensure that the information can be restored as agreed with the Customer. The Company shall log and monitor activities, such as create, reading, copying, amendment and deletion of processed data, as well as exceptions, faults and information security events and regularly review these. Furthermore, the Company shall protect and store (for at least 6 months or such period/s set by Data Protection Law) log information, and on request, deliver monitoring data to the Customer. Anomalies / incidents / indicators of compromise shall be reported according to the data breach management requirements as set out in clause 9, below. The Company shall manage vulnerabilities of all relevant technologies such as operating systems, databases, applications proactively and in a timely manner. The Company shall establish security baselines (hardening) for all relevant technologies such as operating systems, databases, applications. The Company shall ensure development is segregated from test and production environment.
Operations Security. The Service Provider shall cause an SSAE 16 SOC 2 Type 2 audit report to be conducted annually. The audit results and the Service Provider’s plan for addressing or resolution of the audit results shall be shared with the Customer within sixty (60) days of the Service Provider 's receipt of the audit results. Further, on an annual basis, within 90 days of the end of the Service Provider’s fiscal year, the Service Provider shall transmit its annual audited financial statements to the State.
AutoNDA by SimpleDocs
Operations Security a. Maintaining documented Medallia cloud operating procedures.
Operations Security. 8.1. The Supplier shall:
Operations Security. To the extent the Contractor or its subcontractors, affiliates or agents handles, collects, stores, disseminates or otherwise deals with State Data, the Contractor shall cause an SSAE 18 SOC 2 Type 2 audit report to be conducted annually. Upon the State’s request and the execution of an appropriate non-disclosure agreement, Contractor will share the audit results and the Contractor’s plan for addressing or resolution of the audit results. shall be shared with the State within sixty (60) days of the Contractor's receipt of the audit
Time is Money Join Law Insider Premium to draft better contracts faster.