Security and Compliance Sample Clauses

Security and Compliance. Service Provider represents that the information provided by or on behalf of Service Provider in response to Customer’s Vendor Controls Assessment Questionnaire, Software Security Assessment and any other information provided with respect to the Service Provider Systems and Security is complete, truthful, and accurate. Service Provider is responsible for the security of Service Provider Systems and any Information. Service Provider agrees that beginning on the earlier of the effective date of the Agreement, when services commence under the Agreement, or when Service Provider has access to Information, and continuing as long as Service Provider controls, accesses, possesses, stores, transmits or otherwise processes Information, Service Provider shall employ and maintain reasonable, appropriate and adequate Security to: (a) protect all Information from unauthorized use, alteration, access or disclosure, and loss, theft, and damage, and to protect and ensure the confidentiality, integrity and availability of Information; and (b) prevent a Security Breach. In addition, such Security shall meet or exceed all Industry Standards. Service Provider shall comply with all Privacy and Security Laws. The Security that Service Provider is required to employ and maintain pursuant to this section shall include, but not be limited to, the safeguards and controls listed in Schedule A attached hereto and incorporated herein by reference. In the event of any conflict between Service Provider’s obligation to employ and maintain reasonable, appropriate and adequate Security set forth herein, its obligation to meet Industry Standards for Security set forth herein, or any other security-related obligation in the Agreement, Service Provider shall comply with the obligation that provides the most protective and rigorous Security. Prior to making any changes that may materially impact Service Provider’s ability to comply with this Schedule, Service Provider shall provide Customer with written notice of such contemplated changes, including a reasonable description of the anticipated impact of such changes, within a reasonable timeframe in advance of implementation.
AutoNDA by SimpleDocs
Security and Compliance. 7.1. Xxxxxx agrees to implement appropriate measures to ensure Security of Data Processing. Nimble regularly monitors compliance with these safeguards, and further agrees to regularly test, assess and evaluate the effectiveness of its Security of Data Processing.
Security and Compliance i. Maintaining security posture and hardening of all devices ii. Configuration of servers /devices as per latest SCD policy prescribed by the Bank iii. Support during audits (IS audit, CSR, RFIA etc.) and other security review activities iv. Closure of VA-PT incidents and regulatory/in- ternal/external audits & various other audit ob- servations v. Maintaining confidentiality and integrity of all information as per bank’s policy
Security and Compliance. 58. Each organisation will be responsible for ensuring that appropriate data security controls are in place appropriate to the nature and sensitivity of the material and its source, and their respective protective markings. These will include: • restricting access to the data to staff members on a ‘need to know’ only basis; • carrying out duties in accordance with statutory powers and responsibilities; • keeping information securely when not being accessed by these members of staff; and • storing data on a system with security controls that ensure only access is by necessary and relevant people.
Security and Compliance. 安全性與法規遵循
Security and Compliance. 10.1. Dokobit provides the services to end-users as they are described in the Dokobit Terms of Service.
Security and Compliance. The Contractor shall ensure the continual monitoring, compliance, and security for the Veteran- facing Services Platform. Note, all applications currently on the VSP in production have achieved an Authority to Operate (ATO) or are covered by an existing ATO. In the Base Period the Contractor shall be responsible for all tasks listed below. In each Option Period, the Contractor shall be responsible for all tasks listed below with the exception of tasks 5.2.2(e) and 5.2.2(f) which shall be Optional Tasks. In addition, all tasks listed below can also be exercised as optional tasks for the base and option periods.
AutoNDA by SimpleDocs
Security and Compliance. Agency is responsible for the security of Agency Systems and any Information. Agency agrees that beginning on the date that the services commence under the Agreement, and continuing as long as Agency controls, possesses, stores, transmits or processes Information, Agency shall not do or omit to do anything which may cause AIG to be in breach of any Privacy and Security Laws and shall employ and maintain appropriate and adequate Security to: (a) ensure that all Information is protected from unauthorized use, alteration, access or disclosure, and to protect and ensure the confidentiality, integrity and availability of Information; and (b) prevent a Security Breach. In addition, such Security shall, without limitation, comply with the ISO 27002 security standard, and meet or exceed all Industry Standards. Agency shall adhere to the requirements of all Privacy and Security Laws. The Security that Agency is required to employ and maintain pursuant to this section shall include, but not be limited to, the safeguards listed in Exhibit A attached hereto and incorporated herein by reference. In the event of any conflict between Agency’s obligation to employ and maintain appropriate and adequate Security set forth herein, its obligation to meet Industry Standards for Security set forth herein, its obligation to comply with the ISO 27002 security standard, or any other security-related obligation in this Agreement, Agency shall comply with the obligation that provides the most protective and rigorous Security.
Security and Compliance. 7.11 You must, and You are responsible for ensuring that each of the Service Administrators, the Service Auditor, the Authorised Users and anyone else acting on Your behalf will, at all times:
Security and Compliance. Upon request of the City, Contractor shall provide a description on how Contractor will address emerging malware or equipment flaws that may impact City Data, what notification procedures and collaboration methods are used to inform the City about level of risk and options to mitigate.
Time is Money Join Law Insider Premium to draft better contracts faster.