Enhanced Security Measures definition

Enhanced Security Measures. County may, in its discretion, designate certain County owned areas or facilities as ones that require a higher level of security and access control. County shall notify Contractor in writing reasonably in advance of any such designation becoming effective. Any such notice shall set forth in reasonable detail the enhanced security or access-control procedures, measures, or requirements that Contractor shall be required to observe, as well as the date on which such procedures and measures shall take effect. Contractor shall, and shall cause Contractor personnel and subcontractors to, fully comply with and abide by all such enhanced security and access measures and procedures as of such date. General Security Standards: Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems) and networks used by or for Contractor to access County Data or otherwise in connection with the Services (“Contractor Systems”) and shall prevent unauthorized access to County Data through Contractor Systems. At all times during the term, Contractor shall maintain a level of security with regard to Contractor System and County Data for which Contractor has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices. Contractor shall maintain all appropriate administrative, physical, technical, and procedural safeguards to secure County Data from data breach, protect County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and the Services.
Enhanced Security Measures. The County may, in its discretion, designate certain areas, facilities, or systems as ones that require a higher level of security and access control. The County shall notify the Contractor in writing reasonably in advance of any such designation becoming effective. Any such notice shall set forth in reasonable detail the enhanced security or access-control procedures, measures, or requirements that the Contractor shall be required to implement and enforce, as well as the date on which such procedures and measures shall take effect. The Contractor shall, and shall cause the Contractor personnel and subcontractors to, fully comply with and abide by all such enhanced security and access measures and procedures as of such date.

Examples of Enhanced Security Measures in a sentence

  • The Orange County Sheriff’s Department may provide additional security policies concerning its systems and facilities after the Effective Data, which shall be deemed Enhanced Security Measures under Article 27.

Related to Enhanced Security Measures

  • Security Measures has the meaning given in Section 7.1.1 (Google’s Security Measures).

  • technical and organizational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Enhanced softening means the improved removal of disinfection byproduct precursors by precipitative softening.

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.