Security Patches Sample Clauses

Security Patches. Company and Buyer agree on the importance of installing up to date third party security patches to help maintain network and computer workstation security. Company and Buyer will work cooperatively to insure that all necessary third party operating system security patches are installed and tested as quickly as possible. Buyer may install any/all third party security patches as they deem necessary. In the event that installation of a particular patch causes a subsequent defect or error in the operation of Company supplied software, Buyer must remove the patch and contact the Company. Company will then apply best efforts to install and test patch(es) and correct any defects or errors to Company software that results. Company will then update Buyer software to allow Buyer to reinstall patch. Any such installation of security patches shall not void any warranty.
Search the Best Contracts

Draft contracts faster by searching through millions of contracts from the best law firms across all industries.

30+ Reviews on G2 Crowd
Security Patches. You will maintain controls and processes designed to ensure that networks, systems, and devices (including operating systems and applications) that Access Protected Information are up-to-date, including prompt implementation of all security patches when issued; and
Security Patches. Seller and Buyer agree on the importance of installing up to date thirdparty security patches to help maintain network and computer workstation security. Seller and Buyer will work cooperatively to ensure that all necessary third party operating system security patches are installed and tested as quickly as possible. Buyer may install any/all third party security patches as they deem necessary. In the event that installation of aparticular patch causes a subsequent defect or error in the operation of Seller supplied software, Buyer must contact Seller and Seller will then apply best efforts to install and test patch(es) and correct any defects or errors to Seller's software. Seller will then update Buyer software to allow Buyer to reinstall patch. Any such installation of security patches shall not void any warranty.보안 패치. 판매자와 구매자는 네트워크와 컴퓨터 워크스테이션의 보안을 유지하기 위한 최신 제 3 자 보안 패치 설치의 중요성에 대해 동의한다. 판매자와 구매자는 모든 필수적인 제 3 자 운영 체제 보안 패치가 가능한 빨리 설치되고 테스트 할 수 있도록 상호 협력한다. 필요하다고 간주되면, 구매자는 다른 어떠한 제 3 자 보안패치도 설치할 수 있다. 특정 패치의 설치로 인해 판매자가 제공한 소프트웨어에 결함이나 에러가 발생한다면, 구매자는 판매자에게 연락해야 하며, 판매자는 패치의 설치 및 테스트와 더불어, 판매자의 소프트웨어에 발생한 결함 및 에러를 해결할 수 있도록 최대한 노력해야 한다. 그리고 판매자는 구매자의 소프트웨어를 업데이트하고 구매자가 패치를 재설치 할 수 있도록 해야 한다. 그 어떤 보안 패치 설치로 인해도 품질 보증이 무효화 되지 않는다.

Related to Security Patches

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (https://cloudsecurityalliance.org/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Protocols Both parties agree to maintain security protocols that meet industry best practices in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the DPA in a secure computer environment and not copy, reproduce, or transmit data obtained pursuant to the DPA, except as necessary to fulfill the purpose of data requests by LEA. The foregoing does not limit the ability of the Provider to allow any necessary service providers to view or access data as set forth in Article IV, section 4.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Procedures The Customer agrees to comply, and to cause its Authorized Designees to comply, with remote access operating standards and procedures and with user identification or other password control requirements and other security devices and procedures as may be issued or required from time to time by State Street or its third-party vendors for use of the System and access to the Remote Access Services. The Customer is responsible for any use and/or misuse of the System and Remote Access Services by its Authorized Designees. The Customer agrees to advise State Street immediately in the event that it learns or has reason to believe that any person to whom it has given access to the System or the Remote Access Services has violated or intends to violate the terms of this Addendum and the Customer will cooperate with State Street in seeking injunctive or other equitable relief. The Customer agrees to discontinue use of the System and Remote Access Services, if requested, for any security reasons cited by State Street and State Street may restrict access of the System and Remote Access Services by the Customer or any Authorized Designee for security reasons or noncompliance with the terms of this Addendum at any time.