Third Party’s Systems Clause Samples
Third Party’s Systems. Third Party must maintain a secure standard configuration on any machines accessing Information Assets. Such standard configuration shall meet Verint’s current minimum requirements as updated and provided by Verint to Third Party from time to time, including, without limitation, VPN software and protocols, operating systems and versions, and the most current version and signature files of an industry best practice malware, anti-virus, anti-spyware and firewall products. Third Party will be responsible for procuring all systems required by Third Party to access and use Information Assets, including, without limitation, all hardware, software and third party services necessary for such access and/or required to satisfy Third Party’s obligations in this Agreement and otherwise with respect to the applicable Verint Engagement. All systems used in providing any Services to Verint must be hardened to industry best practice.
