COMPLIANCE WITH ENTERPRISE CLOUD AND OFFSITE HOSTING SECURITY Sample Clauses

COMPLIANCE WITH ENTERPRISE CLOUD AND OFFSITE HOSTING SECURITY. If applicable, Seller and Purchaser understand and agree that all Products and Services provided by the Seller under this Agreement must be and remain in compliance with the State of Mississippi’s Enterprise Cloud and Offsite Hosting Security Policy. The parties understand and agree that the State’s Enterprise Cloud and Offsite Hosting Security Policy is based on industry- standard best practices, policy, and guidelines at the time of contract execution and augments the Enterprise Security Policy. The State reserves the right to introduce a new policy during the term of this Agreement and require the Seller to comply with same in the event the industry introduces more secure, robust solutions or practices that facilitate a more secure posture for the State of Mississippi.
AutoNDA by SimpleDocs
COMPLIANCE WITH ENTERPRISE CLOUD AND OFFSITE HOSTING SECURITY. If applicable, Licensor and Licensee understand and agree that all products and services provided by the Licensor under this Agreement must be and remain in compliance with the State of Mississippi’s Enterprise Cloud and Offsite Hosting Security Policy. The parties understand and agree that the State’s Enterprise Cloud and Offsite Hosting Security Policy is based on industry-standard best practices, policy, and guidelines at the time of contract execution and augments the Enterprise Security Policy. The State reserves the right to introduce a new policy during the term of this Agreement and require the Licensor to comply with same in the event the industry introduces more secure, robust solutions or practices that facilitate a more secure posture for the State of Mississippi.
COMPLIANCE WITH ENTERPRISE CLOUD AND OFFSITE HOSTING SECURITY. If applicable, Seller and Purchaser understand and agree that all products and services provided by the Seller under this Agreement must be and remain in compliance with the State of Mississippi’s Enterprise Cloud and Offsite Hosting Security Policy. The parties understand and agree that the State’s Enterprise Cloud and Offsite Hosting Security Policy is based on industry- standard best practices, policy, and guidelines at the time of contract execution and augments the Enterprise Security Policy. The State reserves the right to introduce a new policy during the term of this Agreement and require the Seller to comply with same in the event the industry introduces more secure, robust solutions or practices that facilitate a more secure posture for the State of Mississippi. For the faithful performance of the terms of this EPL Agreement, the parties have caused this EPL Agreement to be executed by their undersigned representatives. State of Mississippi, Department of Information Technology Services, on behalf of the governmental agencies, educational institutions, and governing authorities of the State of Mississippi Xxxxx X Xxxxxxx Computer Sales & Services, Inc. The recipient* agrees to the following reporting and registration requirements of Section 1512 of the American Recovery and Reinvestment Act and in accordance with 2 CFR § 176.50, if applicable: (a) This award requires the recipient to complete projects or activities which are funded under the American Recovery and Reinvestment Act of 2009 (Recovery Act) and to report on use of Recovery Act funds provided through this award. Information from these reports will be made available to the public. (b) The reports are due no later than ten calendar days after each calendar quarter in which the recipient receives the assistance award funded in whole or in part by the Recovery Act. (c) Recipients and their first tier recipients must maintain current registrations in the System for Award Management (XXX) (xxxxx://xxx.xxx.gov) at all times during which they have active federal awards funded with Recovery Act funds. XXX is the official U.S. Government system that consolidated the capabilities of the Central Contractor Registration (CCR) and other vendor registration systems. A Dun and Bradstreet Data Universal Numbering System (DUNS) Number (xxxx://xxx.xxx.xxx) is one of the requirements for registration in the System for Award Management. (d) The recipient shall report the information described in section 15...
COMPLIANCE WITH ENTERPRISE CLOUD AND OFFSITE HOSTING SECURITY. If applicable, Seller and Purchaser understand and agree that all products and services provided by the Seller under this Agreement must be and remain in compliance with the State of Mississippi’s Enterprise Cloud and Offsite Hosting Security Policy. The parties understand and agree that the State’s Enterprise Cloud and Offsite Hosting Security Policy is based on industry- standard best practices, policy, and guidelines at the time of contract execution and augments the Enterprise Security Policy. The State reserves the right to introduce a new policy during the term of this Agreement and require the Seller to comply with same in the event the industry introduces more secure, robust solutions or practices that facilitate a more secure posture for the State of Mississippi. For the faithful performance of the terms of this EPL Agreement, the parties have caused this EPL Agreement to be executed by their undersigned representatives. 1. Only those Vendors classified as Sellers will execute the EPL Purchase Agreement. 2. Sellers have a choice between two versions of the agreement. This exhibit contains the ARRA language. If the Seller does not wish to work with customers using ARRA funding, the Seller must choose to execute Exhibit A-3. 3. Due to the uniformity among EPL Sellers, the terms of the EPL Purchase Agreement are non-negotiable. No edits or changes in the terms and conditions of this document will be made. 4. Seller will only return two (2) copies of the executed signature page. Both copies must be executed with original signatures by the authorized officer of your company. 5. Do n ot return the entire agreement. 6. Once a Seller has been approved and membership has been confirmed for at least one

Related to COMPLIANCE WITH ENTERPRISE CLOUD AND OFFSITE HOSTING SECURITY

  • Compliance with Privacy Code The Corporation acknowledges that the Warrant Agent may, in the course of providing services hereunder, collect or receive financial and other personal information about such parties and/or their representatives, as individuals, or about other individuals related to the subject matter hereof, and use such information for the following purposes: (a) to provide the services required under this Indenture and other services that may be requested from time to time; (b) to help the Warrant Agent manage its servicing relationships with such individuals; (c) to meet the Warrant Agent’s legal and regulatory requirements; and (d) if Social Insurance Numbers are collected by the Warrant Agent, to perform tax reporting and to assist in verification of an individual’s identity for security purposes. The Corporation acknowledges and agrees that the Warrant Agent may receive, collect, use and disclose personal information provided to it or acquired by it in the course of its acting as agent hereunder for the purposes described above and, generally, in the manner and on the terms described in its privacy code, which the Warrant Agent shall make available on its website or upon request, including revisions thereto. Further, the Corporation agrees that it shall not provide or cause to be provided to the Warrant Agent any personal information relating to an individual who is not a party to this Indenture unless the Corporation has assured itself that such individual understands and has consented to the aforementioned uses and disclosures.

  • Compliance with Illinois Privacy Laws In performing its obligations under the Agreement, the Provider shall comply with all Illinois laws and regulations pertaining to student data privacy, confidentiality, and maintenance, including but not limited to the Illinois School Student Records Act ("ISSRA"), 105 ILCS 10/, Mental Health and Developmental Disabilities Confidentiality Act ("MHDDCA"), 740 ILCS 110/, Student Online Personal Protection Act ("SOPPA"), 105 ILCS 85/, Identity Protection Act ("IPA"), 5 ILCS 179/, and Personal Information Protection Act ("PIPA"), 815 ILCS 530/, and Local Records Act (“LRA”), 50 ILCS 205/.

  • Compliance with Existing Laws Xxxxxxx, agrees to comply with all federal, state, and municipal laws, rules, and regulations in the performance of this Agreement that are generally applicable to the activities in which the Grantee is engaged in the performance of said contracts.

  • Compliance with Privacy Laws NCPS represents and warrants that its collection, access, use, storage, disposal and disclosure of Personal Data does and will comply with all applicable federal and state privacy and data protection laws, as well as all other applicable regulations. Without limiting the foregoing, NCPS shall implement administrative, physical and technical safeguards to protect Personal Data that are no less rigorous than accepted industry, and shall ensure that all such safeguards, including the manner in which Personal Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with applicable data protection and privacy laws, as well as the terms and conditions of this Escrow Agreement. NCPS shall use and disclose Personal Data solely and exclusively for the purposes for which the Personal Data, or access to it, is provided pursuant to the terms and conditions of this Escrow Agreement, and not use, sell, rent, transfer, distribute, or otherwise disclose or make available Personal Data for NCPS’s own purposes or for the benefit of any party other than Issuer. For purposes of this section, “Personal Data” shall mean information provided to NCPS by or at the direction of the Issuer, or to which access was provided to NCPS by or at the direction of the Issuer, in the course of NCPS’s performance under this Escrow Agreement that: (i) identifies or can be used to identify an individual (also known as a “data subject”) (including, without limitation, names, signatures, addresses, telephone numbers, e-mail addresses and other unique identifiers); or (ii) can be used to authenticate an individual (including, without limitation, employee identification numbers, government-issued identification numbers, passwords or PINs, financial account numbers, credit report information, biometric or health data, answers to security questions and other personal identifiers), including the identifying information on individuals described in Section 12.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!