Common use of Security Compliance Clause in Contracts

Security Compliance. DCC shall be entitled to carry out such security audits as it may reasonably deem necessary in order to ensure that the Contractor maintains compliance with its security obligations under a Call-Off Contract or this Framework Agreement.

Appears in 2 contracts

Sources: Framework Agreement for the Provision of Capacity & Network Economics Consultancy Services, Framework Agreement for the Provision of Capacity & Network Economics Consultancy Services

Security Compliance. DCC shall be entitled to carry out such security audits as it may reasonably deem necessary in order to ensure that the Contractor maintains compliance with its the Contractor security obligations under a Call-Off Contract or policy and the Security Management Plan, the specific security requirements set out in this Framework Agreementcontract and the Security Controls within this section.

Appears in 1 contract

Sources: Digital Content and Imagery Production Agreement

Security Compliance. DCC shall be entitled to carry out such security audits as it may reasonably deem necessary in order to ensure that the Contractor maintains compliance with its the Contractor Security Policy, the specific security obligations under a Call-Off Contract or requirements set out in this Framework Agreementcontract and the Security Controls within this section.

Appears in 1 contract

Sources: Contract for the Provision of a Service

Security Compliance. DCC shall be entitled to carry out such security audits at no additional cost to the DCC as it may reasonably deem necessary in order to ensure that the Contractor maintains compliance with its the Contractor security obligations under a Call-Off Contract or policy and the Security Management Plan, the specific security requirements set out in this Framework Agreement.contract and the Security Controls within this section. DCCT0254 DCC Confidential Page 20 of 63

Appears in 1 contract

Sources: Provision of a Study to Demonstrate the Technology and Security Landscape for the Next 10 – 15 Years