Consultant System definition
Examples of Consultant System in a sentence
Amendment and Revision of the ISMS and Security Management Plan: The ISMS and Security Management Plan will be fully reviewed and updated by the Consultant annually or from time to time to reflect: emerging changes in Good Industry Practice; any change or proposed change to the Consultant System, the Services and/or associated processes; any new perceived or changed security threats; and any reasonable request by the Architect/Contract Administrator.
The Security Plan will be fully reviewed and updated by the Consultant annually, or from time to time to reflect: emerging changes in Good Industry Practice; any change or proposed change to the Consultant System, the Consultancy Services and/or associated processes; and any new perceived or changed threats to the Consultant System.
Appendix 1 - ITT Appendix 2 - Response to ITT The Third Party Software shall consist of the following items: ENTRAPASS GLOBAL EDITION NORBAIN ACCESS CONTROL MANAGEMENT 4 1 The Consultant acknowledges that the Agency places great emphasis on confidentiality, integrity and availability of information and consequently on the security of the Sites and the security for the Consultant System.
If required for any Site Address(es), as determined solely by Consultant and indicated on Exhibit C, the Parties shall execute an Consultant System enablement plan (“Enablement Plan”) for such Site Address(es), the terms of which shall be attached to this Agreement.
Both the ISMS and the Security Management Plan shall, unless otherwise specified by the Client, aim to protect all aspects of the Services and all processes associated with carrying out the Services, including the Site, the Consultant System and any ICT, information and data (including the Client Confidential Information and the Client Data) to the extent used by the Client or the Consultant in connection with this contract.
The Consultant shall be responsible for the security of the Consultant System and shall at all times provide a level of security which: is in accordance with Good Industry Practice and Law; complies with the Security Policy; meets any specific security threats to the Consultant System; and complies with ISO/IEC27002 and ISO/IEC27001 in accordance with paragraph 4 of this schedule.
Upon becoming aware of any of the circumstances referred to in paragraph 5.1, the Consultant shall: immediately take all reasonable steps necessary to: remedy such breach or protect the Consultant System against any such potential or attempted breach or threat; and prevent an equivalent breach in the future.