Systems Security Sample Clauses

Systems Security. (a) If any Party or its Personnel are given access to any computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt of IT Services, such Party shall comply, and shall cause the other members of its Group and its Personnel to comply, with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party.
AutoNDA by SimpleDocs
Systems Security. (a) If Rank, the Company, their Affiliates or their respective Personnel receive access to any of Rank’s, the Company’s, or their respective Affiliates’, as applicable, Systems in connection with the Services, the accessing Party or its Personnel, as the case may be, shall comply with all of such other Party’s and its Affiliates’ reasonable Security Regulations known to such accessing Party or its Personnel or made known to such accessing Party or its Personnel in writing, and will not tamper with, compromise or circumvent any security, Security Regulations or audit measures employed by such other Party or its relevant Affiliate.
Systems Security a) Vendor must document and maintain adequate:
Systems Security. (a) If either Party or any of its respective Subsidiaries (such Party together with its Subsidiaries, the “Accessing Party”) is given access to the computer system(s), facilities, networks (including voice or data networks) or software (collectively, “Systems”) used by the other Party or any of the other Party’s Subsidiaries (such other Party and its Subsidiaries, the “Disclosing Party”) in connection with the provision of the Services, the Accessing Party shall comply with the Disclosing Party’s security regulations, which shall be provided by the Disclosing Party prior to access to the Systems. The Accessing Party will not tamper with, compromise or circumvent any security or audit measures employed by the Disclosing Party. The Accessing Party shall (i) ensure that only those users who are specifically authorized to gain access to the other’s Systems gain such access and (ii) prevent unauthorized destruction, alteration or loss of information contained therein. If at any time the Disclosing Party determines that any personnel of the Accessing Party has sought to circumvent or has circumvented the Disclosing Party’s security regulations or other security or audit measures or that an unauthorized person has accessed or may access the Disclosing Party’s Systems or a person has engaged in activities that may lead to the unauthorized access, destruction or alteration or loss of data, information or software, the Disclosing Party may immediately terminate any such person’s access to the Systems and, if such person’s access is terminated, shall immediately notify the Accessing Party. In addition, a material failure to comply with the Disclosing Party’s security regulations shall be a breach of this Agreement, and the Parties shall work together to rectify any such failure to comply with the Disclosing Party’s security regulations. If any breach of the Disclosing Party’s security regulations is not rectified within ten days following its occurrence, the Disclosing Party shall be entitled to immediately terminate the Services to which the breach relates or, if it relates to all the Services that the Disclosing Party receives or provides, as applicable, the non-breaching Party shall be entitled to immediately terminate the Agreement in its entirety.
Systems Security. ‌ Insurer shall maintain policies, procedures and practices related to system security and integrity that are in line with national industry standards and best practices. Insurer shall regularly, no less frequently than annually, review and update its policies, procedures and practices for the following areas:
Systems Security. Xxxxxxxx Xxxx, Director Division of Compliance and Assessments Office of Information Security Office of Systems Suite 3383 Perimeter East Building 0000 Xxxxxxxx Xxxxxxxxx Baltimore, MD 00000-0000 Telephone: (000) 000-0000 Email: Xxxxxxxx.Xxxx@xxx.xxx Matching Agreement Xxxxxx Xxxxx, Government Information Specialist Office of Privacy and Disclosure Office of the General Counsel 0000 Xxxxxxxx Xxxxxxxxx, X-000 Xxxx Xxxx Xxxx Xxxxxxxxx, XX 00000-0000 Telephone: (000) 000-0000 Email: Xxxxxx.Xxxxx@xxx.xxx Project Coordinator Xxxx Xxxx Office of Data Exchange and International Agreements Office of Data Exchange, Policy Publications, and International Negotiations 0000 Xxxxxxxx Xxxxxxxxx, 0-X-0-F Annex Building Baltimore, MD 00000-0000 Telephone: (000) 000-0000 Email: Xxxx.Xxxx@xxx.xxx
Systems Security. When Buyer is given access to Seller's computer system(s), facilities, networks (including voice or data networks) or software ("Systems") in connection with the Seller Transition Services or Migration Plan, Buyer shall comply with all lawful security regulations reasonably required by Seller from time to time "Security Regulations"), including without limitation the requirements set forth on Annex C hereto, and will not tamper with, compromise or circumvent any security or audit measures employed by Seller. Buyer's Related Parties may be required to execute a separate system access agreement for individuals who are to have access to Seller's Systems. Buyer shall ensure that only those users who are specifically authorized to gain access to Seller's Systems as necessary to utilize the Seller Transition Services or assist with the Migration gain such access and that such users do not engage in unauthorized destruction, alteration or loss of information contained therein. If at any time a Party determines that any personnel of Buyer has sought to circumvent or has circumvented Seller's Security Regulations or other security or audit measures or that an unauthorized person has accessed or may access Seller's Systems or a person has engaged in activities that may lead to the unauthorized access, destruction or alteration or loss of data, information or software, to the extent within Buyer's control, Buyer or Seller, as appropriate, shall immediately terminate any such person's access to Seller's Systems and immediately notify Seller. In addition, a material failure to comply with the Security Regulations shall be a breach of this Agreement; in which case, Seller shall notify Buyer and both Parties shall work together to rectify said breach. If the breach is not rectified within ten (10) days of its occurrence, the Service Coordinators of both Parties shall be advised in writing of the breach and work together to rectify said breach. If the breach has not been rectified within ten (10) days from such notice to the Service Coordinators, Seller shall be entitled to immediately terminate the Seller Transition Services to which the breach relates until such time as the breach is remedied.
AutoNDA by SimpleDocs
Systems Security. (a) If any Service Provider, or its personnel, will be given access to any Service Recipient’s computer systems or software (“Systems”) in connection with the performance of the Transition Services, Tricadia shall, or shall cause its Affiliates to, use reasonable best efforts to cause any third-party service provider, and their respective personnel, to comply with all of such Service Recipient’s written system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such Service Recipient.
Systems Security. If Customer is permitted access to AT&T Long Distance’s computer systems and data (hereinafter “Systems”) for purposes of managing and maintaining Customer’s telecommunications system, Customer agrees:
Systems Security. Each Party represents and warrants that each Party’s networks, operating systems, and software (collectively, “Systems”) are properly configured to securely access and provide information via City API. Each Party shall promptly report to the other Party any security incidents impacting each Party’s System that may also impact or compromise the other Party’s System or City API. Each Party shall work with the other to correct any security deficiency or incident promptly, at each Party’s own expense.
Time is Money Join Law Insider Premium to draft better contracts faster.