Systems Security Sample Clauses

Systems Security. (a) If any Party or its Personnel are given access to any computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt of Transition Services, such Party shall comply, and shall cause the other members of its Group and its Personnel to comply, with all of such other Party’s Group’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party’s Group.
AutoNDA by SimpleDocs
Systems Security. (a) If Rank, the Company, their Affiliates or their respective Personnel receive access to any of Rank’s, the Company’s, or their respective Affiliates’, as applicable, Systems in connection with the Services, the accessing Party or its Personnel, as the case may be, shall comply with all of such other Party’s and its Affiliates’ reasonable Security Regulations known to such accessing Party or its Personnel or made known to such accessing Party or its Personnel in writing, and will not tamper with, compromise or circumvent any security, Security Regulations or audit measures employed by such other Party or its relevant Affiliate.
Systems Security. ‌ Insurer shall maintain policies, procedures and practices related to system security and integrity that are in line with national industry standards and best practices. Insurer shall regularly, no less frequently than annually, review and update its policies, procedures and practices for the following areas:
Systems Security a) Vendor must document and maintain adequate:
Systems Security. When Buyer is given access to Seller’s computer system(s), facilities, networks (including voice or data networks) or software (“Systems”) in connection with the Transition Services or Migration Plan, Buyer shall comply with all lawful security regulations reasonably required by Seller from time to time “Security Regulations”), including without limitation the requirements set forth on Annex B hereto, and will not tamper with, compromise or circumvent any security or audit measures employed by Seller. Buyer’s Related Parties may be required to execute a separate system access agreement for individuals who are to have access to Seller’s Systems. Buyer shall ensure that only those users who are specifically authorized to gain access to Seller’s Systems as necessary to utilize the Transition Services or assist with the Migration gain such access and that such users do not engage in unauthorized destruction, alteration or loss of information contained therein. If at any time a Party determines that any personnel of Buyer has sought to circumvent or has circumvented Seller’s Security Regulations or other security or audit measures or that an unauthorized person has accessed or may access Seller’s Systems or a person has engaged in activities that may lead to the unauthorized access, destruction or alteration or loss of data, information or software, to the extent within Buyer’s control, Buyer or Seller, as appropriate, shall immediately terminate any such person’s access to Seller’s Systems and immediately notify Seller. In addition, a material failure to comply with the Security Regulations shall be a breach of this Agreement; in which case, Seller shall notify Buyer and both Parties shall work together to rectify said breach. If the breach is not rectified within ten (10) days of its occurrence, the Service Coordinators of both Parties shall be advised in writing of the breach and work together to rectify said breach. If the breach has not been rectified within ten (10) days from such notice to the Service Coordinators, Seller shall be entitled to immediately terminate the Transition Services to which the breach relates until such time as the breach is remedied.
Systems Security. (a) If either Party or any of its respective Subsidiaries (such Party together with its Subsidiaries, the “Accessing Party”) is given access to the computer system(s), facilities, networks (including voice or data networks) or software (collectively, “Systems”) used by the other Party or any of the other Party’s Subsidiaries (such other Party and its Subsidiaries, the “Disclosing Party”) in connection with the provision of the Services, the Accessing Party shall comply with the Disclosing Party’s security regulations, which shall be provided by the Disclosing Party prior to access to the Systems. The Accessing Party will not tamper with, compromise or circumvent any security or audit measures employed by the Disclosing Party. The Accessing Party shall (i) ensure that only those users who are specifically authorized to gain access to the other’s Systems gain such access and (ii) prevent unauthorized destruction, alteration or loss of information contained therein. If at any time the Disclosing Party determines that any personnel of the Accessing Party has sought to circumvent or has circumvented the Disclosing Party’s security regulations or other security or audit measures or that an unauthorized person has accessed or may access the Disclosing Party’s Systems or a person has engaged in activities that may lead to the unauthorized access, destruction or alteration or loss of data, information or software, the Disclosing Party may immediately terminate any such person’s access to the Systems and, if such person’s access is terminated, shall immediately notify the Accessing Party. In addition, a material failure to comply with the Disclosing Party’s security regulations shall be a breach of this Agreement, and the Parties shall work together to rectify any such failure to comply with the Disclosing Party’s security regulations. If any breach of the Disclosing Party’s security regulations is not rectified within ten days following its occurrence, the Disclosing Party shall be entitled to immediately terminate the Services to which the breach relates or, if it relates to all the Services that the Disclosing Party receives or provides, as applicable, the non-breaching Party shall be entitled to immediately terminate the Agreement in its entirety.
Systems Security. (a) If the Provider, Purchaser, their Affiliates or their respective Personnel receive access to any of the Provider’s, Purchaser’s or their respective Affiliates’, as applicable, computer systems or software (“Systems”) in connection with the Transition Services, the accessing party or its Personnel, as the case may be, shall comply with all of such other party’s and its Affiliates’ Security Regulations as have been provided in writing to the other party, and will not tamper with, compromise or circumvent any security or audit measures employed by such other party.
AutoNDA by SimpleDocs
Systems Security. Xxxxx Xxxxxxxx, Acting Director Division of Compliance and Assessments Office of Information Security Office of Systems Social Security Administration 3829 Annex Building 0000 Xxxxxxxx Xxxxxxxxx Xxxxxxxxx, XX 00000 Telephone: (000) 000-0000 Email: xxxxxx.xxxxxxxx@xxx.xxx Matching Agreement Xxxxxxx Xxxxx, Government Information Specialist Office of Privacy and Disclosure Office of the General Counsel 6401 Security Boulevard, 000 Xxxxxxxx Xxxxxxxx Baltimore, MD 00000-0000 Telephone: (000) 000-0000 Email: Xxxxxxx.Xxxxx@xxx.xxx Project Coordinator Xxxx Xxxx Office of Data Exchange Office of Data Exchange and Policy Publications 0000 Xxxxxxxx Xxxxxxxxx, 3-G-9-B Xxxxx Xxxxxxxx Xxxxxxxxx, XX 00000-0000 Telephone: (000) 000-0000 Email: Xxxx.Xxxx@xxx.xxx
Systems Security. (a) If a Recipient Party, its Affiliates, any of their respective personnel or any personnel of any third party retained by such Party or its Affiliates and any authorized agent, auditor or Governmental Authority (collectively, the “Recipient Party Personnel”) is given access by a Performing Party or its Affiliates to: (i) information systems, including any computer systems or software and data stored therein, of the Performing Party or its Affiliates or (collectively, the “Performing Party Systems”), the Recipient Party Personnel shall comply with all of such Performing Party's and its Affiliates' information system security policies, procedures and requirements applicable in accessing and using the Performing Party Systems, and shall not tamper with, compromise or circumvent any security or audit measures employed by such Performing Party or its Affiliates.
Systems Security. (a) If any Citi Party or Banco de Chile Party, or its Personnel or authorized third party, will be given passwords and/or access codes or any other form or mechanism (collectively, “Passwords”) to limit or control access to any Banco de Chile Party’s or Citi Party’s, as applicable, computer systems or software (“Systems”) in connection with the performance of the Services, the accessing Party or its Personnel, as the case may be, shall comply with (i) the processes and procedures set forth in Schedule 5.4, and (ii) all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party. Such Passwords are Confidential Information as provided in Section 5.4(e), and may only be used by such receiving Party and its Authorized Users. Each of Citi and Banco de Chile represents that any user of the Banco de Chile Services or the Citi Services, as the case may be, gaining access by means of such Passwords has been expressly authorized by Citi and Banco de Chile, as the case may be, to use them. Where a Password has been provided to a Party’s employee, agent or customer, such Party shall cause such employee, agent or customer to cease all use of such Password if such employment, agency or customer relationship with such Party terminates for any reason, and in addition such Party shall give the other Party immediate notice of the need to de-activate such Password. Each Party acknowledges and agrees that the other Party may rely on any communications or instructions made online by a person using a Password as if coming from the person authorized to use such Password acting on behalf of such Party, and that any such communications or instructions, including any use or misuse of Passwords by anyone, will be binding on such Party and, if applicable, the person or entity to whom the Password was issued.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!