Security Standard Sample Clauses

Security Standard. During any period when F5 is providing Silverline Services to Customer, F5 shall ensure that it has put in place a security program related to the applicable Silverline Services that complies with the Payment Card Industry Data Security Standard (PCI-DSS) or any similar industry security standard. Upon Customer’s request, which request shall not be made more than once in any twelve (12) month period, F5 shall provide Customer a PCI-DSS, or other similar security standard, attestation of compliance (“AOC”) applicable to the Silverline Services provided hereunder. Reports of compliance/audit reports are not provided to any customers.
AutoNDA by SimpleDocs
Security Standard. Glean will use commercially reasonable technical and organizational measures designed to prevent unauthorized access, use, or disclosure of Customer Data in accordance with the Glean Security Standard made available at xxxxx://xxxxx.xxx/legal/security-standard and incorporated herein by reference (“Security Standard”). Subject to Section 6.4 below, Glean may update the Security Standard from time to time.
Security Standard. TSYS will use commercially reasonable (but no less than industry standard) security measures for its computer systems and physical facilities designed to safeguard against (i) the unauthorized destruction, loss, alteration of, or access to COMPANY’s Confidential Information and Customer Data, whether such information is at or on TSYS’ systems or facilities or in transit, and (ii) the Merchant Services being provided to COMPANY hereunder being affected or interrupted. TSYS reserves the right to make changes in its security infrastructure and procedures from time to time, so long as the level of the security measures provided is not materially reduced.

Related to Security Standard

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Cybersecurity; Data Protection To the best knowledge of the Company after due inquiry, the Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and its Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any Governmental Entity, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!