SOFTWARE SECURITY Sample Clauses

SOFTWARE SECURITY. If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA. EXHIBIT E
AutoNDA by SimpleDocs
SOFTWARE SECURITY. (a) The customer will ensure all reasonable measures are taken to protect the Licensed Materials from any unauthorized use.
SOFTWARE SECURITY. If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA. EXHIBIT F Federally Funded Contracts COUNTY will inform CONTRACTOR of any changes related to funding sources or amounts in this agreement as a result of COUNTY’s Quarterly funding reviews. If changes are needed to reflect updated Federal Funding, this Exhibit is subject to modification with written approval of the County Contract Administrator and the Revenue and Budget Manager and CONTRACTOR will receive the updated Exhibit.
SOFTWARE SECURITY. Company develops and delivers Products, and provides Cloud Services, Maintenance, or Consulting Services, in accordance with the Services Security Exhibit at xxxxx://xxx.xxxxxx.xxx/buy/licensing/citrix-services-security-exhibit.html ("Security Exhibit"), which is incorporated by reference into the Agreement.
SOFTWARE SECURITY a. To the extent Goods and Services consist of or include the installation, sale, delivery, modification or creation of any Software proprietary to Seller or any third-party subcontractor or sub-supplier of Seller:
SOFTWARE SECURITY. (a) We do not guarantee that information or media transmitted over the internet and/or through the Software is totally secure. Therefore, when you or your staff use the Software or Content or provide any information through the Software you do so at your own risk. We take reasonable steps to keep all data and information secure while it is in our own systems.
SOFTWARE SECURITY. Software shall not be used in environments requiring advanced security. Customer is responsible for checking security requirements before using the compiled software on their systems. VIRTUALSCADA will not be liable for any security breach and software vulnerabilities caused by using the software.
AutoNDA by SimpleDocs
SOFTWARE SECURITY. If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA. EXHIBIT E Reporting Exhibit CONTRACTOR agrees to provide COUNTY with reports that may be required by County, State or Federal agencies for compliance with this Agreement including and not limited to: • CONTRACTOR shall submit quarterly status reports and a final annual report to COUNTY which reflect progress made in implementing the services and achieving any outcomes set forth in the Scope of Services exhibit, and to assure CONTRACTOR’S compliance with contract terms. Said annual report shall be submitted by August 31 for the preceding fiscal year. • CONTRACTOR shall make annual client outcome information available to COUNTY within 60 days of fiscal year end. Outcome data will be based upon the full array of services provided and how those services advanced the functional improvement of the client. Functional improvement will be measured by the disposition of the client at discharge. EXHIBIT F Federally Funded Contracts COUNTY will inform CONTRACTOR of any changes related to funding sources or amounts in this agreement as a result of COUNTY’s Quarterly funding reviews. If changes are needed to reflect updated Federal Funding, this Exhibit is subject to modification with written approval of the County Contract Administrator and the Revenue and Budget Manager, and CONTRACTOR will receive the updated Exhibit.
SOFTWARE SECURITY. Each person has a personal password that enables him or her to log onto the system. In addition, the system is programmed to recognize which files this person can access or update. This password is known only to the person and the System Administrator. Passwords are changed periodically to maintain the security of the system. Passwords are immediately deleted if a person transfers out or has his or her employment terminated. In addition, a system security manual has been developed which outlines authorization levels for users and audit procedures. SCHEDULE E RECORDKEEPING FEE SCHEDULE 1. $1.92 per participant per year. -- A participant with both an XXX rollover account and an XXX contributory account will receive one charge. -- A participant with both a TSA basic account and a TSA supplemental account will receive one charge.
SOFTWARE SECURITY. The Company has taken all actions that a reasonably prudent person in the Company’s business would take to protect against the existence of (i) any protective, encryption, security or lock-out devices that might in any way interrupt, discontinue or otherwise adversely affect the Software Products and Internal Software Systems or Buyer’s use thereof; and (ii) any so-called computer viruses, worms, trap or back doors, Trojan horses or any other instructions, codes, programs, data or materials which could improperly interfere with the operation or use of the Software Products and Internal Software Systems, wrongfully and/or without the authorization of Buyer. The Company has been and continues to be in full compliance with the on-line data privacy policy posted on its web page.
Time is Money Join Law Insider Premium to draft better contracts faster.