Systems and Security Clause Samples
The Systems and Security clause establishes requirements and standards for the protection and management of information systems and data. It typically outlines the security measures that must be implemented, such as access controls, encryption, regular security assessments, and incident response protocols. This clause applies to any party handling sensitive or proprietary information, ensuring that both technical and organizational safeguards are in place. Its core function is to mitigate the risk of data breaches, unauthorized access, and other security threats, thereby protecting the integrity and confidentiality of information shared under the agreement.
Systems and Security. ▇▇▇▇▇▇ ▇. ▇▇▇▇▇ Information System Security Officer (ISSO) Division of Marketplace IT Operations Marketplace IT Group Center for Consumer Information & Insurance Oversight Centers for Medicare & Medicaid Services ▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ Baltimore, MD 21244 Telephone: (▇▇▇) ▇▇▇-▇▇▇▇ Telephone: (▇▇▇) ▇▇▇-▇▇▇▇ (Mobile) Email: ▇▇▇▇▇▇.▇▇▇▇▇@▇▇▇.▇▇▇.▇▇▇ ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ CMS Privacy Act Officer Division of Security, Privacy Policy and Governance Information Security and Privacy Group Office of Information Technology Centers for Medicare & Medicaid Services ▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ Location: N1-14-56 Baltimore, MD ▇▇▇▇▇-▇▇▇▇ Telephone: (▇▇▇) ▇▇▇-▇▇▇▇ Email: ▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇▇.▇▇▇.▇▇▇
Systems and Security. 13.1 The Service Provider confirms that it will at all times adhere to the Municipality’s IT Policies during the tenure of this agreement when undertaking work on the municipal system.
13.2 The Parties must ensure that no person other than those authorised has or obtains access to the information and systems of the Municipality.
13.3 Each Party must immediately notify the other in writing if it has a reason to believe that any of the Municipality’s confidential information or transactions may have been viewed by an unauthorised person.
13.4 Should any security threat be identified by either Party, the Service Provider must on such identification immediately notify the Municipality through any reasonable urgent means of communication regarding the security threat that has been identified as it relates to the Services and must take all such remedial actions as in necessary to remove any such threat. The Service Provider will provide the Municipality with written communication regarding the actions taken in this regard.
Systems and Security. 6.1. In addition to any other data security terms set forth in this Agreement, if Partner is granted access to any WhatsApp or its Affiliates’ systems, networks, databases, computers, or other information systems owned, controlled or operated by or on their respective behalf (collectively “System(s)”), then such access is subject to Partner’s and the Partner Parties’ Compliance. Access to Systems is granted solely to facilitate the Services, and is limited to those specific Systems, time periods, and personnel as are separately designated by WhatsApp in writing. Partner represents and warrants that it has adequate security measures in place to comply with the above obligations and to ensure that access granted arising from this Agreement will not impair the integrity and availability of Systems.
6.2. Partner represents and warrants that it shall not introduce into WhatsApp’s Systems or Infrastructure, the Sublicensed Encryption Software, or otherwise make accessible to WhatsApp any viruses or any software licensed under the General Public Licence or any similar licence (e.g. GNU Affero General Public License (AGPL), GNU General Public License (GPL), GNU Lesser General Public License (LGPL)) containing a "copyleft" requirement during performance of the Services. Partner shall implement the security objectives described below to protect its systems, including the physical, technical, and administrative controls that govern access to and use of the Partner systems. To enable oversight of the Partner’s implementation of the measures, Partner shall have in place a dedicated security team to oversee the development, implementation, effectiveness testing and ongoing maintenance of a security program, in order to realise these security requirements. The Partner shall also, at the request of WhatsApp, be able to describe the means by which it is achieving these security requirements and shall maintain appropriate records and other evidence to enable the Partner to review the implemented security measures.
Systems and Security. ▇▇▇▇▇▇ ▇. ▇▇▇▇▇
