IT/OT Technology definition
Examples of IT/OT Technology in a sentence
Contractor’s use of, and access and connection(s) to Company’s IT/OT Technology are provided for a specific business purpose and are to be used for that purpose only.
Contractor hereby agrees to protect Company’s IT/OT Technology from unauthorized use and access and agrees to provide or take such security measures as may be necessary to assure such protection in accordance with security best-practices and the standards set forth herein.
Where remote access is enabled, Contractor shall provide support for the potential isolation of Company IT/OT Technology from Contractor’s networks or systems.
In addition, notification shall be no later than two (2) hours for suspected ransomware and other similar intrusions where timing is critical to stopping proliferation and propagation and Contractor has any access to IT/OT Technology or is Hosting Information.
Company reserves the right to deny or revoke access to Information, Product/Services infrastructure, and IT/OT Technology to any individual for which a successful Personnel Risk Assessment cannot be confirmed.
Contractor agrees to coordinate its response to a confirmed or suspected Security Incident with Company as necessary to prevent or limit, to the fullest extent possible, impact to Company operations, Information, and IT/OT Technology.
In addition, Contractor shall permit, and shall cause each of its employees, agents, or representatives for which it seeks access or continued access to Information, Product/Services infrastructure, and/or IT/OT Technology to permit Company conduct, or cause to be conducted such Personnel Risk Assessment.
Unless otherwise expressly provided in writing, a Personnel Risk Assessment is required for each of Contractor’s employees, agents, or representatives for which Contractor seeks access or continued access to Information, Product/Services infrastructure, and/or IT/OT Technology.
Contractor shall conduct, or cause to be conducted, a Personnel Risk Assessment for each of its employees, agents, or representatives for which it seeks access or continued access to Information and/or IT/OT Technology.
Effective patch management practices shall be used on all of Contractor’s systems and assets (e.g., workstations, servers, and other configurable devices to the extent technically feasible) with remote or direct connections to IT/OT Technology, that store or host Information and Product/Services infrastructure.