Client Cyber Security Sample Clauses

Client Cyber Security. It is understood that within the Services provided, it is not the intent, nor does the SimplePowerIT provide any type of internet security monitoring, cyber security monitoring, cyber terrorism monitoring, or other cyber threats for Client unless otherwise specified in the SOW. As cyber threats are always evolving it is strongly recommended that Client engage the services of a cyber protection third-party vendor to monitor the cyber controls and cyber activities in Client System. In no event, including the negligent act or omission on its part, shall SimplePowerIT, whether under these Terms, an SOW, or otherwise in connection with any of them, be liable in contract, tort, third-party liability, breach of statutory duty or otherwise, in respect of any direct, indirect or consequential losses or expenses, including without limitation loss of anticipated profits, company shut-down, third- party loss or injury, any loss because of data breach, any loss of personally identifiable or protected information, goodwill, use, market reputation, business receipts or contracts or commercial opportunities, whether or not foreseeable, if such loss was the result of or arose from any act of terrorism, strike or similar labor action, war, invasion, act of foreign enemy, hostilities or warlike operations, civil war, rebellion, revolution, insurrection, civil commotion assuming the proportions of or amounting to an uprising, or any action taken in controlling, preventing or suppressing any of these things, including any such act or series of acts of any person or group(s) or persons, whether acting alone or on behalf of or in connection with any organization(s), committed for political, religious or ideological purposes including but not limited to the intention to influence any government and/or to put the public in fear for such purposes by using activities perpetrated electronically that are directed towards the destruction, disruption or subversion of communication and information systems, infrastructure, computers, telecommunications or electronic networks and/or its content thereof or sabotage and or threat therefrom.
AutoNDA by SimpleDocs
Client Cyber Security. Client understands and agrees that data loss or network failures may occur, whether or not foreseeable. In order to reduce the likelihood of a network failure, Client must maintain proper security for its computer and information system including software and hardware updates. Client will adhere to software and hardware updates and maintain specific security standards, policies, procedures set forth by the NIST Cybersecurity Framework available at xxxxx://xxx.xxxx.xxx/cyberframework. It is understood that within the Services provided it is not the intent, nor does Cylanda provide any type of internet security monitoring, cyber security monitoring, cyber terrorism monitoring, or other cyber threats for Client unless otherwise specified in the MSA or other contract documents. As cyber threats are always evolving, it is strongly recommended that Client engage Cylanda’s services for cyber protection to monitor the cyber controls and cyber activities in Client’s system.
Client Cyber Security. It is understood that within the Services provided, it is not the intent, nor does the CNS provide any type of internet security monitoring, cyber security monitoring, cyber terrorism monitoring, or other cyber threats for Client unless otherwise specified in the REQUESTED SERVICES. As cyber threats are always evolving it is strongly recommended that Client engage the services of a cyber protection third-party vendor to independently monitor the cyber controls and cyber activities in Client System.
Client Cyber Security. Client acknowledges and agrees that the services provided pursuant to this Agreement are limited to the Services as set forth in the applicable Statement(s) of Work. Unless otherwise specified in a Statement of Work for “Managed Cybersecurity Services”, XXX does not provide, nor does XXX intend to provide, internet security monitoring, cybersecurity monitoring, cyber terrorism monitoring, or any other cyber threat monitoring for Client. As cyber threats are always evolving, if Client has not entered into a “Managed Cybersecurity Services” SOW with XXX, XXX strongly recommends that Client engage the services of a cyber protection third-party vendor to monitor the cyber controls and cyber activities in Client’s networks and systems.
Client Cyber Security. It is understood that the Services provided under this Agreement are limited only to those articulated in a SOW executed between the Parties. If the Client elects to obtain cybersecurity services under a SOW, CSI shall provide reasonable industry- standard physical, administrative, and technical safeguards that will evolve with emerging threats to reasonably protect Client’s systems and data, from unauthorized access. Client agrees and understands that cybersecurity services are constantly evolving and that these services may require ongoing changes to the SOW in order to remain current. Client also understands and acknowledges that cybersecurity services cannot prevent all possible cybersecurity incidents due to their constantly evolving nature. Recommendations or requests from CSI that impact cybersecurity services are made on a time is of essence basis and Client agrees to treat such recommendations or requests as high priority material elements of this Agreement and any SOW issued hereunder. DUE TO THE CONSTANT EVOLVING NATURE OF CYBER THREATS, NEITHER THIS AGREEMENT NOR ANY SOW CONSTITUTE AN ABSOLUTE GUARANTEE REGARDING THE SECURITY OF CLIENT DATA.
Client Cyber Security. Client understands and agrees that data loss or network failures may occur, whether or not foreseeable. In order to reduce the likelihood of a network failure, Client must maintain proper security for its computer and information system including software and hardware updates. Client will adhere to software and hardware updates and maintain specific security standards, policies, procedures set forth by the NIST Cybersecurity Framework available at xxxxx://xxx xxxx.xxx/xxxxxxxxxxxxxx. It is understood that within the Services provided it is not the intent, nor does XXX.Xxxxxxxxx LLC provide any type of internet security monitoring, cyber security monitoring, cyber terrorism monitoring, or other cyber threats for Client unless otherwise specified in the MSA or other contract documents; Client therefore agrees to hold XXX.Xxxxxxxxx LLC harmless from and against any such data loss or network failure as a result of a) Client’s failure to comply with the terms of this Section 13, or b) cyber terrorism. As cyber threats are always evolving, it is strongly recommended that Client engage the services of a cyber protection third-party vendor to monitor the cyber controls and cyber activities in Client’s system.

Related to Client Cyber Security

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

Time is Money Join Law Insider Premium to draft better contracts faster.