Common use of Communications and Operational Management Clause in Contracts

Communications and Operational Management. Contractor must: (i) monitor and manage all of its information processing facilities, including without limitation, implementing operational procedures, change management and incident response procedures; (ii) deploy adequate anti-viral software and adequate back-up facilities to ensure essential business information can be promptly recovered in the event of a disaster or media failure; and (iii) ensure its operating procedures will be adequately documented and designed to protect information, computer media, and data from theft and unauthorized access.

Appears in 2 contracts

Samples: Consulting Services Agreement, Contract for Offender Monitoring Services

AutoNDA by SimpleDocs

Communications and Operational Management. Contractor mustshall: (i) monitor and manage all of its information processing facilities, including including, without limitation, implementing operational procedures, change management and incident response procedures; and (ii) deploy adequate anti-viral software and adequate back-up facilities to ensure essential business information can be promptly recovered in the event of a disaster or media failure; and (iii) ensure its operating procedures will be adequately documented and designed to protect information, computer media, and data from theft and unauthorized access.

Appears in 2 contracts

Samples: Master Agreement for Project Management Services, Healthcare Agreements

AutoNDA by SimpleDocs

Communications and Operational Management. Contractor must: shall (i) monitor and manage all of its information processing facilities, including including, without limitation, implementing operational procedures, change management and incident response procedures; and (ii) deploy adequate anti-viral software and adequate back-up facilities to ensure essential business information can be promptly recovered in the event of a disaster or media failure; and (iii) ensure its operating procedures will be adequately documented and designed to protect information, computer media, and data from theft and unauthorized access.

Appears in 1 contract

Samples: Contract

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!