{"component": "clause", "props": {"groups": [{"size": 60, "snippet_links": [{"key": "party-hereto", "type": "definition", "offset": [11, 23]}, {"key": "access-to-the", "type": "clause", "offset": [33, 46]}, {"key": "other-party", "type": "clause", "offset": [47, 58]}, {"key": "computer-systems", "type": "definition", "offset": [61, 77]}, {"key": "in-connection-with", "type": "clause", "offset": [120, 138]}, {"key": "the-services", "type": "definition", "offset": [139, 151]}, {"key": "the-party", "type": "clause", "offset": [153, 162]}, {"key": "availed-party", "type": "definition", "offset": [182, 195]}, {"key": "comply-with", "type": "definition", "offset": [204, 215]}, {"key": "security-policies", "type": "definition", "offset": [248, 265]}, {"key": "procedures-and-requirements", "type": "clause", "offset": [267, 294]}, {"key": "in-advance", "type": "clause", "offset": [340, 350]}, {"key": "in-writing", "type": "clause", "offset": [355, 365]}, {"key": "security-regulations", "type": "definition", "offset": [382, 402]}, {"key": "tamper-with", "type": "definition", "offset": [420, 431]}, {"key": "employed-by", "type": "definition", "offset": [489, 500]}, {"key": "right-to-access-and-use", "type": "clause", "offset": [630, 653]}, {"key": "each-party", "type": "definition", "offset": [659, 669]}, {"key": "use-commercially-reasonable-efforts", "type": "clause", "offset": [683, 718]}, {"key": "to-ensure", "type": "clause", "offset": [719, 728]}, {"key": "the-systems", "type": "clause", "offset": [812, 823]}, {"key": "unauthorized-access", "type": "definition", "offset": [912, 931]}, {"key": "loss-of-information", "type": "clause", "offset": [965, 984]}, {"key": "the-restrictions", "type": "clause", "offset": [1041, 1057]}, {"key": "in-this-agreement", "type": "definition", "offset": [1068, 1085]}, {"key": "the-security", "type": "clause", "offset": [1093, 1105]}, {"key": "at-any-time", "type": "clause", "offset": [1127, 1138]}, {"key": "engaged-in", "type": "definition", "offset": [1373, 1383]}, {"key": "loss-of-data", "type": "definition", "offset": [1469, 1481]}, {"key": "notify-the", "type": "clause", "offset": [1633, 1643]}, {"key": "in-addition", "type": "clause", "offset": [1664, 1675]}, {"key": "right-to-deny", "type": "clause", "offset": [1716, 1729]}, {"key": "party-access", "type": "clause", "offset": [1755, 1767]}, {"key": "notice-to-the", "type": "clause", "offset": [1788, 1801]}, {"key": "in-the-event", "type": "clause", "offset": [1816, 1828]}, {"key": "reasonably-believes", "type": "definition", "offset": [1857, 1876]}, {"key": "the-activities", "type": "clause", "offset": [1920, 1934]}, {"key": "security-concern", "type": "clause", "offset": [1994, 2010]}, {"key": "cooperate-with", "type": "clause", "offset": [2075, 2089]}], "snippet": "(a) If any party hereto is given access to the other party\u2019s computer systems or software (collectively, the \u201cSystems\u201d) in connection with the Services, the party given access (the \u201cAvailed Party\u201d) shall comply with all of the other party\u2019s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, \u201cSecurity Regulations\u201d), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.\n(b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations.\n(c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person\u2019s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party\u2019s Systems.", "samples": [{"hash": "iXZQQ0czi4d", "uri": "/contracts/iXZQQ0czi4d#system-security", "label": "Transition Services Agreement (Babcock & Wilcox Enterprises, Inc.)", "score": 26.5879535675, "published": true}, {"hash": "4u23Rxx17lM", "uri": "/contracts/4u23Rxx17lM#system-security", "label": "Transition Services Agreement (Babcock & Wilcox Enterprises, Inc.)", "score": 26.5879535675, "published": true}, {"hash": "4gxFAhRVpX1", "uri": "/contracts/4gxFAhRVpX1#system-security", "label": "Transition Services Agreement (Babcock & Wilcox Enterprises, Inc.)", "score": 26.3415470123, "published": true}], "hash": "6f0f3bf15a9e0e5b0c9970896945c5cd", "id": 1}, {"size": 9, "snippet_links": [{"key": "the-participant-shall", "type": "clause", "offset": [0, 21]}, {"key": "security-measures", "type": "clause", "offset": [32, 49]}, {"key": "with-respect-to", "type": "clause", "offset": [50, 65]}, {"key": "the-system-and-the-services", "type": "clause", "offset": [66, 93]}, {"key": "in-accordance-with", "type": "clause", "offset": [94, 112]}, {"key": "the-policies", "type": "clause", "offset": [113, 125]}, {"key": "procedures-and-standards", "type": "clause", "offset": [127, 151]}, {"key": "incorporated-herein-by-reference", "type": "clause", "offset": [162, 194]}], "snippet": "The Participant shall implement security measures with respect to the System and the Services in accordance with the Policies, Procedures and Standards, which is incorporated herein by reference.", "samples": [{"hash": "606obhK6CkJ", "uri": "/contracts/606obhK6CkJ#system-security", "label": "Health Information Exchange Organization Participation Agreement", "score": 34.6832885742, "published": true}, {"hash": "d35Mc0InCZK", "uri": "/contracts/d35Mc0InCZK#system-security", "label": "Health Information Exchange Organization Participation Agreement", "score": 34.4245567322, "published": true}], "hash": "a5b92e1870fbedcc945aa6df526820e2", "id": 8}, {"size": 7, "snippet_links": [{"key": "notwithstanding-anything-to-the-contrary", "type": "clause", "offset": [0, 40]}, {"key": "contractor-must-provide", "type": "clause", "offset": [49, 72]}, {"key": "all-work", "type": "clause", "offset": [73, 81]}, {"key": "technologies-and-techniques", "type": "clause", "offset": [101, 128]}, {"key": "in-accordance-with", "type": "clause", "offset": [129, 147]}, {"key": "industry-standards", "type": "clause", "offset": [152, 170]}, {"key": "best-practices", "type": "clause", "offset": [185, 199]}, {"key": "applicable-county", "type": "definition", "offset": [204, 221]}, {"key": "security-policies", "type": "definition", "offset": [222, 239]}, {"key": "procedures-and-requirements", "type": "clause", "offset": [241, 268]}, {"key": "by-the-county", "type": "clause", "offset": [278, 291]}, {"key": "to-contractor", "type": "definition", "offset": [292, 305]}, {"key": "in-writing", "type": "clause", "offset": [306, 316]}, {"key": "the-rfp", "type": "clause", "offset": [328, 335]}, {"key": "incorporated-by", "type": "clause", "offset": [341, 356]}, {"key": "as-required-by-law", "type": "clause", "offset": [401, 419]}, {"key": "relating-to", "type": "definition", "offset": [437, 448]}, {"key": "prevention-and-detection-of-fraud", "type": "clause", "offset": [453, 486]}, {"key": "inappropriate-use", "type": "clause", "offset": [496, 513]}, {"key": "systems-and-networks", "type": "definition", "offset": [527, 547]}, {"key": "without-limiting-the-generality-of-the-foregoing", "type": "clause", "offset": [549, 597]}, {"key": "management-and-maintenance", "type": "definition", "offset": [641, 667]}, {"key": "and-tools", "type": "clause", "offset": [681, 690]}, {"key": "fraud-prevention-and-detection", "type": "clause", "offset": [695, 725]}, {"key": "encryption-technologies", "type": "clause", "offset": [730, 753]}, {"key": "disabling-device", "type": "clause", "offset": [790, 806]}, {"key": "the-solution", "type": "clause", "offset": [812, 824]}, {"key": "in-this-contract", "type": "clause", "offset": [847, 863]}, {"key": "information-security-requirements", "type": "clause", "offset": [893, 926]}, {"key": "exhibit-c", "type": "clause", "offset": [931, 940]}, {"key": "service-level-agreement", "type": "definition", "offset": [942, 965]}, {"key": "in-no-event", "type": "clause", "offset": [968, 979]}, {"key": "the-security", "type": "clause", "offset": [1067, 1079]}, {"key": "systems-and-data", "type": "clause", "offset": [1122, 1138]}], "snippet": "Notwithstanding anything to the contrary herein, Contractor must provide all Work utilizing security technologies and techniques in accordance with the industry standards, Contractor\u2019s best practices and applicable County security policies, procedures and requirements provided by the County to Contractor in writing as part of the RFP (and incorporated by this reference), this Contract or otherwise as required by law, including those relating to the prevention and detection of fraud or other inappropriate use or access of Systems and networks. Without limiting the generality of the foregoing, Contractor must implement and use network management and maintenance applications and tools and fraud prevention and detection and encryption technologies and prevent the introduction of any Disabling Device into the Solution, as further specified in this Contract and Attachment C.1 (County \u2013 Information Security Requirements) to Exhibit C (Service Level Agreement). In no event must Contractor\u2019s actions or inaction result in any situation that is less secure than the security that Contractor then provides for its own Systems and data.", "samples": [{"hash": "AHU7Q16I6v", "uri": "/contracts/AHU7Q16I6v#system-security", "label": "Contract for Regional Photo System (Rps) Solution", "score": 33.1220779419, "published": true}, {"hash": "8NaZb2YuHbn", "uri": "/contracts/8NaZb2YuHbn#system-security", "label": "Contract for Regional Photo System (Rps) Solution", "score": 32.0435562134, "published": true}, {"hash": "cPMvbaisXAU", "uri": "/contracts/cPMvbaisXAU#system-security", "label": "Contract for Regional Photo System (Rps) Solution", "score": 26.062286377, "published": true}], "hash": "10897c92506480d2ef7f33ec792f275b", "id": 9}, {"size": 12, "snippet_links": [{"key": "the-contractor-agrees", "type": "clause", "offset": [27, 48]}, {"key": "authority-network", "type": "definition", "offset": [130, 147]}, {"key": "written-authorization", "type": "definition", "offset": [162, 183]}, {"key": "security-administrator", "type": "definition", "offset": [201, 223]}, {"key": "computer-equipment", "type": "definition", "offset": [245, 263]}, {"key": "hardware-and-software", "type": "definition", "offset": [280, 301]}, {"key": "by-the-authority", "type": "clause", "offset": [320, 336]}, {"key": "prior-to", "type": "definition", "offset": [360, 368]}, {"key": "network-connection", "type": "clause", "offset": [402, 420]}], "snippet": "Unless otherwise provided, the Contractor agrees not to attach any Contractor- supplied computers, peripherals or software to the Authority Network without prior written authorization from Authority\u2019s Security Administrator. Contractor-supplied computer equipment, including both hardware and software, must be reviewed by the Authority Security Administrator prior to being connected to any Authority network connection and that it must have up-to-date anti-virus software and personal firewall software installed and activated on it.", "samples": [{"hash": "jbUpuIkwJmO", "uri": "/contracts/jbUpuIkwJmO#system-security", "label": "Client Service Contract", "score": 30.3390369415, "published": true}, {"hash": "jDWtU7EJLf6", "uri": "/contracts/jDWtU7EJLf6#system-security", "label": "Interagency Agreement", "score": 30.3390369415, "published": true}, {"hash": "gknqkoDIyrC", "uri": "/contracts/gknqkoDIyrC#system-security", "label": "Client Service Contract", "score": 30.3390369415, "published": true}], "hash": "8161b34dc558a48e6f419944a923640e", "id": 5}, {"size": 33, "snippet_links": [{"key": "access-to", "type": "definition", "offset": [13, 22]}, {"key": "modification-of", "type": "clause", "offset": [26, 41]}, {"key": "district-systems", "type": "definition", "offset": [42, 58]}, {"key": "internet-services", "type": "definition", "offset": [110, 127]}, {"key": "security-system", "type": "clause", "offset": [189, 204]}, {"key": "yes-no", "type": "definition", "offset": [256, 262]}], "snippet": "Unauthorized access to or modification of District systems including file servers, routers, switches, NDS and Internet services is prohibited. Any attempt to bypass or subvert any District security system, both hardware, and software is prohibited. Agree: Yes No", "samples": [{"hash": "1DaHsfkLekv", "uri": "/contracts/1DaHsfkLekv#system-security", "label": "Vendor Statement of Compliance Data Privacy and Protection", "score": 33.4276542664, "published": true}, {"hash": "M8mBoK3CBu", "uri": "/contracts/M8mBoK3CBu#system-security", "label": "Vendor Statement of Compliance Data Privacy and Protection", "score": 32.1459350586, "published": true}, {"hash": "fsBeXLA13ca", "uri": "/contracts/fsBeXLA13ca#system-security", "label": "Vendor Statement of Compliance Data Privacy and Protection", "score": 31.4166984558, "published": true}], "hash": "2bf8b66799ff40c12be5c35ae3e5dcfe", "id": 2}, {"size": 9, "snippet_links": [{"key": "delivery-of-services", "type": "clause", "offset": [40, 60]}, {"key": "under-this-contract", "type": "clause", "offset": [61, 80]}, {"key": "for-purposes-of-this", "type": "clause", "offset": [104, 124]}, {"key": "adequate-security", "type": "definition", "offset": [135, 152]}, {"key": "compliance-with-federal", "type": "clause", "offset": [175, 198]}, {"key": "state-of-montana", "type": "clause", "offset": [203, 219]}, {"key": "security-requirements", "type": "clause", "offset": [220, 241]}, {"key": "to-ensure", "type": "clause", "offset": [246, 255]}, {"key": "the-state", "type": "clause", "offset": [302, 311]}, {"key": "information-technology", "type": "clause", "offset": [334, 356]}, {"key": "access-to-the", "type": "clause", "offset": [380, 393]}, {"key": "standards-and-policies", "type": "definition", "offset": [479, 501]}, {"key": "nist-cybersecurity-framework", "type": "definition", "offset": [522, 550]}, {"key": "revision-of", "type": "clause", "offset": [563, 574]}, {"key": "contractor-shall-provide", "type": "clause", "offset": [716, 740]}, {"key": "reasonable-proof", "type": "definition", "offset": [741, 757]}, {"key": "independent-audit-reports", "type": "clause", "offset": [767, 792]}, {"key": "the-system", "type": "definition", "offset": [799, 809]}, {"key": "this-agreement", "type": "clause", "offset": [826, 840]}, {"key": "security-and-privacy", "type": "clause", "offset": [928, 948]}, {"key": "availability-of", "type": "clause", "offset": [982, 997]}, {"key": "contract-liaison", "type": "clause", "offset": [1097, 1113]}, {"key": "security-controls", "type": "clause", "offset": [1185, 1202]}, {"key": "form-of", "type": "definition", "offset": [1231, 1238]}, {"key": "assessment-report", "type": "definition", "offset": [1255, 1272]}], "snippet": "Contractor shall ensure systems used in delivery of services under this Contract are adequately secure. For purposes of this Contract, adequate security is defined to require compliance with federal and State of Montana security requirements and to ensure freedom from those conditions that may impair the State's use of its data and information technology or permit unauthorized access to the State's data or information technology. The State of Montana has established control standards and policies that align with the NIST Cybersecurity Framework. The latest revision of NIST SP 800-53 is used for control adherence evaluation established after developing a security categorization utilizing FIPS PUB 199. Thus, Contractor shall provide reasonable proof, through independent audit reports, that the system specified under this Agreement meets or exceeds federal and State of Montana security requirements to ensure adequate security and privacy, confidentiality, integrity, and availability of the State's data and information technology. Annual assurance statements shall be delivered to the Contract Liaison. Annual assurance statements must contain a detailed accounting of the security controls provided and must be in the form of a NIST Security Assessment Report or FedRAMP Security Assessment Report.", "samples": [{"hash": "5ygSat97jNO", "uri": "/contracts/5ygSat97jNO#system-security", "label": "Contract Amendment", "score": 32.8264427185, "published": true}, {"hash": "d7H17GA2BrM", "uri": "/contracts/d7H17GA2BrM#system-security", "label": "Contract for Enhanced/Transitional Supervision Services (Etss)", "score": 25.1765918732, "published": true}, {"hash": "cYbBXS8uoF6", "uri": "/contracts/cYbBXS8uoF6#system-security", "label": "Contract for Enhanced/Transitional Supervision Services (Etss)", "score": 24.8316230774, "published": true}], "hash": "d790dda82727f0792f7cad459539a930", "id": 7}, {"size": 10, "snippet_links": [{"key": "responsible-for", "type": "clause", "offset": [17, 32]}, {"key": "security-of", "type": "clause", "offset": [37, 48]}, {"key": "computer-equipment", "type": "definition", "offset": [55, 73]}, {"key": "employees-shall", "type": "clause", "offset": [99, 114]}, {"key": "promptly-notify", "type": "clause", "offset": [115, 130]}, {"key": "immediate-supervisor", "type": "definition", "offset": [137, 157]}, {"key": "employees-with", "type": "clause", "offset": [183, 197]}, {"key": "access-to-student-records", "type": "clause", "offset": [198, 223]}, {"key": "authorized-by", "type": "clause", "offset": [279, 292]}, {"key": "federal-and-state-law", "type": "clause", "offset": [293, 314]}], "snippet": "a. Employees are responsible for the security of their computer equipment, files and passwords.\nb. Employees shall promptly notify their immediate supervisor of security problems.\nc. Employees with access to student records may not use, release, or share these records except as authorized by Federal and State law.", "samples": [{"hash": "8HAW1T5Zzij", "uri": "/contracts/8HAW1T5Zzij#system-security", "label": "Employee Computer Use Agreement", "score": 24.4665737152, "published": true}, {"hash": "ezLb8JOGUsT", "uri": "/contracts/ezLb8JOGUsT#system-security", "label": "Employee Technology Use Agreement", "score": 24.4483222961, "published": true}, {"hash": "8kK6rzAYPrO", "uri": "/contracts/8kK6rzAYPrO#system-security", "label": "Employee Technology Use Agreement", "score": 23.9164962769, "published": true}], "hash": "e3fb0bd058c95ab9bd41bb9bb73e7d80", "id": 6}, {"size": 17, "snippet_links": [{"key": "the-contractor-acknowledges", "type": "clause", "offset": [0, 27]}, {"key": "responsibility-for-loss", "type": "clause", "offset": [28, 51]}, {"key": "unauthorized-acquisition", "type": "definition", "offset": [55, 79]}, {"key": "personal-information", "type": "clause", "offset": [83, 103]}, {"key": "social-security-numbers", "type": "clause", "offset": [121, 144]}, {"key": "credit-card", "type": "clause", "offset": [146, 157]}, {"key": "financial-account-information", "type": "definition", "offset": [167, 196]}, {"key": "other-information", "type": "clause", "offset": [201, 218]}, {"key": "an-individual", "type": "clause", "offset": [244, 257]}, {"key": "in-accordance-with", "type": "clause", "offset": [291, 309]}, {"key": "absence-of-insurance-coverage", "type": "clause", "offset": [353, 382]}, {"key": "type-of-coverage", "type": "definition", "offset": [400, 416]}, {"key": "liability-for", "type": "clause", "offset": [446, 459]}, {"key": "information-breaches", "type": "clause", "offset": [469, 489]}], "snippet": "The Contractor acknowledges responsibility for loss or unauthorized acquisition of personal information it holds such as social security numbers, credit card numbers, financial account information, or other information that uniquely identifies an individual and may be of a sensitive nature in accordance with \u00a72- 6-1501, MCA through \u00a72-6-1503, MCA. In absence of insurance coverage specific to this type of coverage, Contractor assumes personal liability for any such information breaches.", "samples": [{"hash": "g1egxUreIaL", "uri": "/contracts/g1egxUreIaL#system-security", "label": "Contract Amendment", "score": 31.851940155, "published": true}, {"hash": "47Z4MvGT5Pt", "uri": "/contracts/47Z4MvGT5Pt#system-security", "label": "Contract Amendment", "score": 31.5982646942, "published": true}, {"hash": "lL2q5jj4kUK", "uri": "/contracts/lL2q5jj4kUK#system-security", "label": "Connections Corrections Program Contract", "score": 25.2710475922, "published": true}], "hash": "73e09ac654629309ff58df3891ca4d12", "id": 4}, {"size": 19, "snippet_links": [{"key": "grid-system", "type": "definition", "offset": [9, 20]}, {"key": "in-accordance-with", "type": "clause", "offset": [30, 48]}, {"key": "the-code", "type": "clause", "offset": [49, 57]}], "snippet": "managing Grid System Security in accordance with the Code;", "samples": [{"hash": "9bnq7p4Hjqa", "uri": "/contracts/9bnq7p4Hjqa#system-security", "label": "Distributor Agreement", "score": 36.1379585266, "published": true}, {"hash": "jjeFH1jvxWL", "uri": "/contracts/jjeFH1jvxWL#system-security", "label": "Distribution Agreement", "score": 33.2332954407, "published": true}, {"hash": "13HFSxyDjie", "uri": "/contracts/13HFSxyDjie#system-security", "label": "Distributor Agreement", "score": 32.8555374146, "published": true}], "hash": "f0b89c666d6095684ac693cac70c1f0a", "id": 3}, {"size": 6, "snippet_links": [{"key": "represents-and-warrants-that-it", "type": "clause", "offset": [11, 42]}, {"key": "industry-standard", "type": "clause", "offset": [55, 72]}, {"key": "unauthorized-disclosure", "type": "definition", "offset": [106, 129]}, {"key": "confidential-information", "type": "definition", "offset": [158, 182]}], "snippet": "Contractor represents and warrants that it will employ industry standard or better protections to prevent unauthorized disclosure or exposure of sensitive or confidential information that City provides to any system developed or licensed hereunder or to any system for which a component or Deliverable is developed or licensed hereunder.", "samples": [{"hash": "ewCPJjyl6uk", "uri": "/contracts/ewCPJjyl6uk#system-security", "label": "Professional Services Agreement", "score": 28.1055011749, "published": true}, {"hash": "bWAFCBJ5K44", "uri": "/contracts/bWAFCBJ5K44#system-security", "label": "Professional Services", "score": 28.1055011749, "published": true}, {"hash": "axdYVE0toVK", "uri": "/contracts/axdYVE0toVK#system-security", "label": "Professional Services", "score": 28.1055011749, "published": true}], "hash": "fb280f3978e58962e979a3e47575c549", "id": 10}], "next_curs": "ClgSUmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjQLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhhzeXN0ZW0tc2VjdXJpdHkjMDAwMDAwMGEMogECZW4YACAA", "clause": {"size": 519, "title": "System Security", "children": [["", ""], ["unauthorized-access", "Unauthorized Access"], ["personnel-access", "Personnel Access"], ["security-policy", "Security Policy"], ["background-checks", "Background Checks"]], "parents": [["confidentiality", "Confidentiality"], ["security", "Security"], ["miscellaneous", "Miscellaneous"], ["services", "Services"], ["definitions", "Definitions"]], "id": "system-security", "related": [["network-security", "Network Security", "Network Security"], ["system-security-review", "System Security Review", "<strong>System Security</strong> Review"], ["e7-security", "E7 Security", "E7 Security"], ["password-security", "Password Security", "Password Security"], ["server-security", "Server Security", "Server Security"]], "related_snippets": [], "updated": "2026-01-10T05:48:19+00:00"}, "json": true, "cursor": ""}}