Client Cyber Security Sample Clauses

Client Cyber Security. It is understood that within the Services provided, it is not the intent, nor does the SimplePowerIT provide any type of internet security monitoring, cyber security monitoring, cyber terrorism monitoring, or other cyber threats for Client unless otherwise specified in the SOW. As cyber threats are always evolving it is strongly recommended that Client engage the services of a cyber protection third-party vendor to monitor the cyber controls and cyber activities in Client System. In no event, including the negligent act or omission on its part, shall SimplePowerIT, whether under these Terms, an SOW, or otherwise in connection with any of them, be liable in contract, tort, third-party liability, breach of statutory duty or otherwise, in respect of any direct, indirect or consequential losses or expenses, including without limitation loss of anticipated profits, company shut-down, third- party loss or injury, any loss because of data breach, any loss of personally identifiable or protected information, goodwill, use, market reputation, business receipts or contracts or commercial opportunities, whether or not foreseeable, if such loss was the result of or arose from any act of terrorism, strike or similar labor action, war, invasion, act of foreign enemy, hostilities or warlike operations, civil war, rebellion, revolution, insurrection, civil commotion assuming the proportions of or amounting to an uprising, or any action taken in controlling, preventing or suppressing any of these things, including any such act or series of acts of any person or group(s) or persons, whether acting alone or on behalf of or in connection with any organization(s), committed for political, religious or ideological purposes including but not limited to the intention to influence any government and/or to put the public in fear for such purposes by using activities perpetrated electronically that are directed towards the destruction, disruption or subversion of communication and information systems, infrastructure, computers, telecommunications or electronic networks and/or its content thereof or sabotage and or threat therefrom.
AutoNDA by SimpleDocs
Client Cyber Security. Client understands and agrees that data loss or network failures may occur, whether or not foreseeable. In order to reduce the likelihood of a network failure, Client must maintain proper security for its computer and information system including software and hardware updates. Client will adhere to software and hardware updates and maintain specific security standards, policies, procedures set forth by the NIST Cybersecurity Framework available at xxxxx://xxx.xxxx.xxx/cyberframework. It is understood that within the Services provided it is not the intent, nor does Cylanda provide any type of internet security monitoring, cyber security monitoring, cyber terrorism monitoring, or other cyber threats for Client unless otherwise specified in the MSA or other contract documents. As cyber threats are always evolving, it is strongly recommended that Client engage Cylanda’s services for cyber protection to monitor the cyber controls and cyber activities in Client’s system.
Client Cyber Security. It is understood that the Services provided under this Agreement are limited only to those articulated in a SOW executed between the Parties. If the Client elects to obtain cybersecurity services under a SOW, CSI shall provide reasonable industry- standard physical, administrative, and technical safeguards that will evolve with emerging threats to reasonably protect Client’s systems and data, from unauthorized access. Client agrees and understands that cybersecurity services are constantly evolving and that these services may require ongoing changes to the SOW in order to remain current. Client also understands and acknowledges that cybersecurity services cannot prevent all possible cybersecurity incidents due to their constantly evolving nature. Recommendations or requests from CSI that impact cybersecurity services are made on a time is of essence basis and Client agrees to treat such recommendations or requests as high priority material elements of this Agreement and any SOW issued hereunder. DUE TO THE CONSTANT EVOLVING NATURE OF CYBER THREATS, NEITHER THIS AGREEMENT NOR ANY SOW CONSTITUTE AN ABSOLUTE GUARANTEE REGARDING THE SECURITY OF CLIENT DATA.
Client Cyber Security. It is understood that within the Services provided, it is not the intent, nor does the CNS provide any type of internet security monitoring, cyber security monitoring, cyber terrorism monitoring, or other cyber threats for Client unless otherwise specified in the REQUESTED SERVICES. As cyber threats are always evolving it is strongly recommended that Client engage the services of a cyber protection third-party vendor to independently monitor the cyber controls and cyber activities in Client System.
Client Cyber Security. Client acknowledges and agrees that the services provided pursuant to this Agreement are limited to the Services as set forth in the applicable Statement(s) of Work. Unless otherwise specified in a Statement of Work for “Managed Cybersecurity Services”, XXX does not provide, nor does XXX intend to provide, internet security monitoring, cybersecurity monitoring, cyber terrorism monitoring, or any other cyber threat monitoring for Client. As cyber threats are always evolving, if Client has not entered into a “Managed Cybersecurity Services” SOW with XXX, XXX strongly recommends that Client engage the services of a cyber protection third-party vendor to monitor the cyber controls and cyber activities in Client’s networks and systems.
Client Cyber Security. Client understands and agrees that data loss or network failures may occur, whether or not foreseeable. In order to reduce the likelihood of a network failure, Client must maintain proper security for its computer and information system including software and hardware updates. Client will adhere to software and hardware updates and maintain specific security standards, policies, procedures set forth by the NIST Cybersecurity Framework available at xxxxx://xxx xxxx.xxx/xxxxxxxxxxxxxx. It is understood that within the Services provided it is not the intent, nor does XXX.Xxxxxxxxx LLC provide any type of internet security monitoring, cyber security monitoring, cyber terrorism monitoring, or other cyber threats for Client unless otherwise specified in the MSA or other contract documents; Client therefore agrees to hold XXX.Xxxxxxxxx LLC harmless from and against any such data loss or network failure as a result of a) Client’s failure to comply with the terms of this Section 13, or b) cyber terrorism. As cyber threats are always evolving, it is strongly recommended that Client engage the services of a cyber protection third-party vendor to monitor the cyber

Related to Client Cyber Security

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS. 18.2 A Tender Securing Declaration shall use the form included in Section IV, Tendering Forms. 18.3 If a Tender Security is specified pursuant to ITT 18.1, the Tender Security shall be a demand guarantee in any of the following forms at the Tenderer option: i) cash; ii) a bank guarantee; iii) a guarantee by an insurance company registered and licensed by the Insurance Regulatory Authority listed by the Authority; or

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!