{"component": "definition", "props": {"groups": [{"samples": [{"hash": "3WBYZhOdoY3", "uri": "/contracts/3WBYZhOdoY3#it-environment", "label": "Model Services Agreement", "score": 36.307926178, "published": true}, {"hash": "faMEqBhAXr5", "uri": "/contracts/faMEqBhAXr5#it-environment", "label": "Services Agreement", "score": 32.7394752502, "published": true}, {"hash": "kgSQgXnhmFf", "uri": "/contracts/kgSQgXnhmFf#it-environment", "label": "Services Agreement", "score": 30.5106315613, "published": true}], "snippet_links": [{"key": "authority-system", "type": "definition", "offset": [4, 20]}, {"key": "supplier-system", "type": "definition", "offset": [29, 44]}], "size": 19, "snippet": "the Authority System and the Supplier System;", "hash": "b58e1da39ddb02f91be307b2ea724ce7", "id": 1}, {"samples": [{"hash": "gLUFvcyADQ8", "uri": "/contracts/gLUFvcyADQ8#it-environment", "label": "Services Contract", "score": 33.182926178, "published": true}, {"hash": "gBtAexLYgmE", "uri": "/contracts/gBtAexLYgmE#it-environment", "label": "Services Contract", "score": 33.0800056458, "published": true}, {"hash": "87wHm84jif", "uri": "/contracts/87wHm84jif#it-environment", "label": "Services Contract", "score": 33.0800056458, "published": true}], "snippet_links": [{"key": "the-purchaser", "type": "definition", "offset": [6, 19]}, {"key": "service-provider-system", "type": "definition", "offset": [35, 58]}], "size": 9, "snippet": "means the Purchaser System and the Service Provider System;", "hash": "99afacecf3fdfdf64741c8e645f94705", "id": 2}, {"samples": [{"hash": "d3Kf7PC4hg9", "uri": "https://jutacomplinews.co.za/media/filestore/2024/07/Joint_Standard_2_of_2024__Cybersecurity__Cyber_resilience_Requirements_1.pdf", "label": "jutacomplinews.co.za", "score": 19.2509117126, "published": false}, {"hash": "6Oe4YRQWqts", "uri": "https://www.masthead.co.za/wp-content/uploads/2024/01/FSCA-PA_Draft_Joint_Standard_Cybersecurity_and_Cyber_Resilience_2023-1.pdf", "label": "www.masthead.co.za", "score": 19.0694675446, "published": false}, {"hash": "24zqFxpRvKJ", "uri": "https://moonstonedesk.co.za/plist/nuusbrief/MS%20Library/Annexure-A-Joint-Standard-Cybersecurity-and-cyber-resilience.pdf", "label": "moonstonedesk.co.za", "score": 17.7469406128, "published": false}], "snippet_links": [{"key": "it-assets", "type": "definition", "offset": [39, 48]}, {"key": "financial-institution", "type": "definition", "offset": [85, 106]}], "size": 5, "snippet": "means the IT components which comprise IT assets, operations and human elements of a financial institution;", "hash": "7bba246deea7363e4b5dc580ed9dc28e", "id": 3}, {"samples": [{"hash": "bCOHkLGOMSq", "uri": "/contracts/bCOHkLGOMSq#it-environment", "label": "Transitional Services Agreement (Alcon Inc)", "score": 30.2676258087, "published": true}, {"hash": "eMBIUlBdqKJ", "uri": "/contracts/eMBIUlBdqKJ#it-environment", "label": "Transitional Services Agreement (Alcon Inc)", "score": 30.1581115723, "published": true}, {"hash": "6vBT3W59INo", "uri": "/contracts/6vBT3W59INo#it-environment", "label": "Transitional Services Agreement (Alcon Inc)", "score": 30.0458583832, "published": true}], "snippet_links": [{"key": "in-clause", "type": "clause", "offset": [22, 31]}], "size": 3, "snippet": "has the meaning given in clause 2.2(b)(i);", "hash": "c5d7475bce75a21883221c928e838105", "id": 4}, {"samples": [{"hash": "UQJqaTuYeG", "uri": "/contracts/UQJqaTuYeG#it-environment", "label": "Software License Agreement", "score": 27.7515392303, "published": true}, {"hash": "i2VRig7VIkN", "uri": "/contracts/i2VRig7VIkN#it-environment", "label": "Software License Agreement", "score": 27.7419567108, "published": true}, {"hash": "bFLlIclLUcY", "uri": "/contracts/bFLlIclLUcY#it-environment", "label": "Software License Agreement", "score": 27.6981525421, "published": true}], "snippet_links": [{"key": "computer-systems", "type": "clause", "offset": [14, 30]}, {"key": "licensee-group", "type": "definition", "offset": [38, 52]}, {"key": "to-the-extent", "type": "clause", "offset": [108, 121]}, {"key": "to-provide", "type": "clause", "offset": [145, 155]}, {"key": "it-services", "type": "definition", "offset": [156, 167]}], "size": 3, "snippet": "means (1) the computer systems of the Licensee Group, and (2) the computer systems of IT Suppliers but only to the extent these systems are used to provide IT Services to one or more of the Licensee Group.", "hash": "616e038716849f9cbc55e33b4f95418e", "id": 5}, {"samples": [{"hash": "keE0ZrCM6u1", "uri": "/contracts/keE0ZrCM6u1#it-environment", "label": "It Solutions and System Integration Services Agreement", "score": 25.5790557861, "published": true}, {"hash": "budbZYaJbcP", "uri": "/contracts/budbZYaJbcP#it-environment", "label": "It Solutions and System Integration Services Agreement", "score": 23.5790557861, "published": true}], "snippet_links": [{"key": "rail-system", "type": "clause", "offset": [8, 19]}, {"key": "supplier-system", "type": "definition", "offset": [28, 43]}], "size": 2, "snippet": "Network Rail System and the Supplier System;", "hash": "f0307aac86a1b78a652e3ee3795f5a1d", "id": 6}, {"samples": [{"hash": "8YJptu71mjr", "uri": "/contracts/8YJptu71mjr#it-environment", "label": "Services Agreement (Tecnomatix Technologies LTD)", "score": 18.0, "published": true}, {"hash": "3ge0ySnm9BG", "uri": "/contracts/3ge0ySnm9BG#it-environment", "label": "Statement of Work (Sow) (Tecnomatix Technologies LTD)", "score": 18.0, "published": true}], "snippet_links": [{"key": "set-out", "type": "definition", "offset": [16, 23]}, {"key": "exhibit-a-to", "type": "definition", "offset": [27, 39]}, {"key": "the-agreement", "type": "clause", "offset": [40, 53]}], "size": 2, "snippet": "has the meaning set out in EXHIBIT A to the Agreement.", "hash": "a222047d7bfd1f5fdf6d4b7792459bb0", "id": 7}, {"samples": [{"hash": "Xc77a4LRG0", "uri": "/contracts/Xc77a4LRG0#it-environment", "label": "Operations Support Services Agreement (Equifax Inc)", "score": 19.0, "published": true}, {"hash": "7Fl7hgwxzty", "uri": "https://investor.equifax.com/sec-filings/quarterly-reports/content/0001047469-04-014439/0001047469-04-014439.pdf", "label": "Amendment", "score": 12.6386041641, "published": false}], "snippet_links": [{"key": "it-infrastructure", "type": "definition", "offset": [23, 40]}, {"key": "it-services", "type": "definition", "offset": [45, 56]}], "size": 2, "snippet": "means collectively the IT Infrastructure and IT Services.", "hash": "a04da5bdb12756fc67464a8a3c7eead2", "id": 8}, {"samples": [{"hash": "9AUDtR5n0zv", "uri": "/contracts/9AUDtR5n0zv#it-environment", "label": "Service Agreement (Tecnomatix Technologies LTD)", "score": 18.0, "published": true}, {"hash": "8YJptu71mjr", "uri": "/contracts/8YJptu71mjr#it-environment", "label": "Services Agreement (Tecnomatix Technologies LTD)", "score": 18.0, "published": true}], "snippet_links": [{"key": "customer-software", "type": "definition", "offset": [44, 61]}, {"key": "proprietary-software", "type": "definition", "offset": [74, 94]}, {"key": "third-party-contracts", "type": "definition", "offset": [130, 151]}], "size": 2, "snippet": "means all HP-OMS Hardware, HP-OMS Software, Customer Software, Customer's proprietary Software and any Hardware or Software under Third Party Contracts.", "hash": "77bbfd1ccb64e9159ce1a535a10ccda0", "id": 9}, {"samples": [{"hash": "glp7N0NqOfa", "uri": "/contracts/glp7N0NqOfa#it-environment", "label": "Professional Services Agreement", "score": 35.5602035522, "published": true}, {"hash": "1Uw32FG7HmG", "uri": "/contracts/1Uw32FG7HmG#it-environment", "label": "Professional Services", "score": 35.2240219116, "published": true}], "snippet_links": [{"key": "the-customer", "type": "definition", "offset": [6, 18]}, {"key": "it-infrastructure", "type": "definition", "offset": [21, 38]}, {"key": "the-services", "type": "definition", "offset": [164, 176]}], "size": 2, "snippet": "means the Customer\u2019s IT infrastructure and environment, which may include hardware, software and Personnel means Interactive\u2019s employees or contractors who perform the Services.", "hash": "733b7672ddedbc775903ab53d2c3605e", "id": 10}], "next_curs": "ClsSVWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjcLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIXaXQtZW52aXJvbm1lbnQjMDAwMDAwMGEMogECZW4YACAA", "definition": {"size": 78, "snippet": "the Authority System and the Supplier System;", "title": "IT Environment", "id": "it-environment", "examples": ["County and Contractor shall approve, in writing, all Contractor personnel who are authorized to access County\u2019s <strong>IT Environment</strong> (\u201cAuthorized User\u201d).", "The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor (unless otherwise agreed in writing between the Parties) to check for, contain the spread of, and minimise the impact of Malicious Software in the <strong>IT Environment</strong> (or as otherwise agreed by the Parties).", "Contractor shall immediately (and in any event within forty-eight (48) hours) provide written notice to County if an Authorized User is terminated or no longer requires access to County\u2019s <strong>IT Environment</strong> to perform the Services.", "The Supplier shall create and maintain a rolling schedule of planned maintenance to the <strong>IT Environment</strong> (the \u201cMaintenance Schedule\u201d) which shall be agreed with the Authority.", "Contractor acknowledges and agrees that Authorized Users do not have any expectation of privacy with respect to County\u2019s <strong>IT Environment</strong>, and County may, in its sole discretion, monitor, intercept, analyze, assess, or evaluate any and all activity or communications occurring on or within County\u2019s <strong>IT Environment</strong>.", "Authorized Users shall, at any and all times, exercise commercially reasonable care to protect the security, operability, and functionality of County\u2019s <strong>IT Environment</strong> and comply with any provided County policies or procedures governing access, use, or security of the same.", "County and Contractor shall agree, in writing, to the manner and technical configuration in which Authorized Users is be granted remote access to County\u2019s <strong>IT Environment</strong>.", "For the avoidance of doubt, Authorized Users shall not exfiltrate, export, or transfer any data or information from County\u2019s <strong>IT Environment</strong>, unless required to perform the Services or as otherwise approved separately in writing by County.", "County may, in its sole discretion, prevent or terminate access to County\u2019s <strong>IT Environment</strong>.", "In the event an Authorized User is granted a username and password to enable access to County\u2019s <strong>IT Environment</strong>, that Authorized User must employ, implement and maintain commercially reasonable measures to safeguard and protect said username and password, refrain from providing said username and password to any third party, and immediately (and in any event within forty-eight (48) hours) provide written notification to County in the event the confidentiality of said username and password is compromised."], "related": [["ict-environment", "ICT Environment", "ICT Environment"], ["customer-environment", "Customer Environment", "Customer Environment"], ["services-environment", "Services Environment", "Services Environment"], ["production-environment", "Production Environment", "Production Environment"], ["operating-environment", "Operating Environment", "Operating Environment"]], "related_snippets": [], "updated": "2025-07-24T04:27:56+00:00"}, "json": true, "cursor": ""}}