Security Architecture Sample Clauses

Security Architecture. (a) Promptly address any security and privacy events as notified at xxxx://xxx.xxxxxx.xxx/security/security-bulletins/, except those categorized as “Informational”.
AutoNDA by SimpleDocs
Security Architecture. Contractor specifically represents and warrants that with respect to Contractor-owned and/or controlled Hardware, Software and Environments, Contractor has established and during the term of this Agreement will at all times maintain: A security architecture that reasonably ensures implemented and effective NIST 800-53 security controls; A system of effective firewall(s) and intrusion detection technologies necessary to protect CDPH data; Appropriate network security design elements that provide for segregation of data; Procedures to encrypt information in transmission and storage; Procedures to ensure regular testing of Contractor'ssecurity systems and processes; Database and application layer design processes that ensure website applications are designed to protect CDPH data that is collected, processed, and transmitted through such systems.
Security Architecture. As the Smart Grid grows more complex and interconnected in the coming years, it is crucial that it is designed to be secure. A good security architecture is crucial. We see three important topics. First, how the operational technology (OT) systems, such as SCADA systems, smart metering systems and legacy systems, are connected first to the IT systems of DSOs, and then (indirectly) to the rest of the world. Second, how the WAN communications with the many devices spread over substations, homes, businesses, and other places are secured. And third, how access to the different components and sys- tems is controlled. Now 2020 2025 • IT and OT networks connected in an ad hoc manner • WAN security relies on telecom network • Simple access control • Structured network zoning, e.g. following IEC 62443 • WAN communications encrypted and authenticated • Centralized access management • Security in the endpoints • End-to-end secure communications • Multi-stakeholder trust relations (using public key cryptogrpaphy)
Security Architecture. QBE and OnePath General shall demonstrate security architectural requirements are incorporated into their architecture proposals where the availability, integrity and confidentiality of relevant information may be impacted. Proposed security architecture must ensure that relevant information processed, stored and transmitted from information systems owned or managed by QBE or OnePath General are protected from internal and external threats.
Security Architecture. 1. A structured and enforced security architecture covering all information resources, assets and standards of TikaMobile has been developed and applied to all lengths of the company.
Security Architecture. Development The purpose of the “Security Architecture Development” process is to develop a plan and set of principles that describe: (a) the security services that a system is required to provide to meet the needs of its users; (b) the system elements required to implement the services; and (c) the performance levels required in the elements to deal with the threat environment, (the “Security Architecture”). The Security Architecture Development process includes the following activities, as applicable: 1 Receiving the Security Policy; IT Value Chain IM Description 2 Developing high level alternatives that comply with the Enterprise IT Architecture and selecting from among the alternatives, including by:
Security Architecture. 6. A security architecture has been devised and applied across the information resources of Veeva. The architecture comprises a defined set of security mechanisms and supporting standards.
AutoNDA by SimpleDocs
Security Architecture. Licensor is responsible for security of the Data Center including, but not limited to, servers, routers, firewalls, switches, circuits, and related software, and has deployed various types of defense against unauthorized access to the Data Center. Licensee-owned equipment that is connected to any Licensor-maintained device (e.g., border router, firewall) must comply with current Licensor requirements and standards, the current version of which are available upon request. Licensor will provide reasonable notice to Licensee of any change to the requirements or standards. Any anticipated changes to Licensee's environment that may affect the Hosting Services must be submitted in writing to Licensor for Licensor's review and approval at least one week prior to Licensee's scheduled implementation. If Licensee modifies its equipment or software configurations that result in any interruption of the Hosting Services, all diagnostic and repair time conducted by Licensor to restore connectivity will be billed to Licensee at Licensor's then-current rates. Upon Licensee's written request, Licensor will provide Licensee with a copy of the most recent independent security audit report (SAS 70) of Licensor's operations, provided that such SAS 70 report shall be treated as Licensor's Proprietary Information.
Security Architecture 

Related to Security Architecture

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Design At no cost to SCE, Seller shall be responsible for:

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

Time is Money Join Law Insider Premium to draft better contracts faster.