System Security Checking Sample Clauses

System Security Checking a. Vendor will: (1) install, test and maintain security policy verification software; (2) perform system security checks of managed mainframes, mid-range servers, network devices, and system tools to validate compliance with the technical specifications documented in the [ * ]. System security checks will be performed on a sample of systems. Checks will verify that:
System Security Checking. Supplier will: (i) Install, test and maintain security policy verification Software; (ii) Perform system security checks of managed mainframes, mid-range servers, network devices, and system tools to validate compliance with the technical specifications documented in the Information Security Controls Document every six (6) months. System security checks will be performed on a random sample of systems, with a minimum of 10% of systems sampled. Checks will verify that: (A) Anti-Virus Software is functional and operating on supported servers; (B) Technical controls to enforce operating system password policy are in place; and (C) Logs of privileged access and log-on/log-off activities are being captured as defined in the Information Security Controls document technical specifications.

Related to System Security Checking

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Operator’s Security Contact Information ▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Named Security Contact ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇.▇▇▇ Email of Security Contact (▇▇▇) ▇▇▇-▇▇▇▇ Phone Number of Security Contact

  • Cash Management Systems On or prior to the Closing Date, Borrowers will establish and will maintain until the Termination Date, the cash management systems described in Annex C (the “Cash Management Systems”).

  • Cash Management System On or prior to the Closing Date and until the Termination Date, Borrower will establish and maintain the cash management system described in Schedule D. All payments in respect of the Collateral shall be made to or deposited in the blocked or lockbox accounts described in Schedule D in accordance with the terms thereof.