COMPLIANCE WITH ENTERPRISE SECURITY POLICY Sample Clauses

COMPLIANCE WITH ENTERPRISE SECURITY POLICY. Seller and Purchaser understand and agree that all products and services provided by Seller under this EPL Agreement must be and remain in compliance with the State of Mississippi’s Enterprise Security Policy. The parties understand and agree that the State’s Enterprise Security Policy is based on industry-standard best practices, policy, and guidelines at the time of contract execution. The State reserves the right to introduce a new policy during the term of this EPL Agreement and require the Seller to comply with same in the event the industry introduces more secure, robust solutions or practices that facilitate a more secure posture for the State of Mississippi.
AutoNDA by SimpleDocs
COMPLIANCE WITH ENTERPRISE SECURITY POLICY. Contractor and Customer understand and agree that all Services provided by Contractor under this Master Agreement must be and remain in compliance with the State of Mississippi’s Enterprise Security Policy. The parties understand and agree that the State’s Enterprise Security Policy is based on industry-standard best practices, policy, and guidelines at the time of contract execution. The State reserves the right to introduce a new policy during the term of this Master Agreement and require Contractor to comply with same in the event the industry introduces more secure, robust solutions or practices that facilitate a more secure posture for the State of Mississippi.
COMPLIANCE WITH ENTERPRISE SECURITY POLICY. Contractor understands that its work under this Contract must be in compliance with the State of Mississippi’s Enterprise Security Policy. The Enterprise Security Policy is based on industry-standard best practices, policy, and guidelines and covers the following topics: Web servers, email, virus prevention, firewalls, data encryption, remote access, passwords, servers, physical access, traffic restrictions, wireless, laptop and mobile devices, disposal of hardware/media, and application assessment/certification. Given that information security is an evolving technology practice, the State reserves the right to introduce new policy during the term of this Contract and require the Contractor to comply with same in the event the industry introduces more secure, robust solutions or practices that facilitate a more secure posture for the State of Mississippi.
COMPLIANCE WITH ENTERPRISE SECURITY POLICY. Licensor and Licensee understand and agree that all products and services provided by Licensor under this Agreement must be and remain in compliance with the State of Mississippi’s Enterprise Security Policy. The parties understand and agree that the State’s Enterprise Security Policy is based on industry-standard best practices, policy, and guidelines at the time of contract execution. The State reserves the right to introduce a new policy during the term of this Agreement and require the Licensor to comply with same in the event the industry introduces more secure, robust solutions or practices that facilitate a more secure posture for the State of Mississippi.

Related to COMPLIANCE WITH ENTERPRISE SECURITY POLICY

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Compliance with Executive Orders Concerning Ethics The Contractor warrants that he and his firm have complied in all respects with the Governor’s Executive Orders concerning ethics matters, including, but not limited to, Executive Order dated January 13, 2003 (establishing Code of Ethics for Executive Branch Officers and Employees, including provisions governing former officers and employees); Executive Order dated October 1, 2003 (governing vendors to state agencies and disclosure and registration of lobbyists); and O.C.G.A. Sections 21-5-70(5), 21-5-71 and 21-5-73, all as amended effective January 9, 2006 (requiring registration and disclosure filings by state agency vendor lobbyists). In this regard, the Contractor certifies that any lobbyist employed or retained by the Contractor or his firm has both registered and made the required disclosures required by the Executive Orders, as amended.

  • Compliance with Policies Each Individual Limited Partner hereby agrees that he shall comply with all policies and procedures adopted by any member of the Och-Ziff Group or which Limited Partners are required to observe by law, or by any recognized stock exchange, or other regulatory body or authority.

  • Compliance with Xxxxx-Xxxxx and Related Act requirements All rulings and interpretations of the Xxxxx-Xxxxx and Related Acts contained in 29 CFR parts 1, 3, and 5 are herein incorporated by reference in this contract.

  • Certification of Compliance with the Energy Policy and Conservation Act When appropriate and to the extent consistent with the law, Vendor certifies that it will comply with the Energy Policy and Conservation Act (42 U.S.C. 6321 et seq; 49 C.F.R. Part 18) and any mandatory standards and policies relating to energy efficiency which are contained in applicable state energy conservation plans issued in compliance with the Act. Does Vendor agree? Yes

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Compliance with Illinois Privacy Laws In performing its obligations under the Agreement, the Provider shall comply with all Illinois laws and regulations pertaining to student data privacy, confidentiality, and maintenance, including but not limited to the Illinois School Student Records Act ("ISSRA"), 105 ILCS 10/, Mental Health and Developmental Disabilities Confidentiality Act ("MHDDCA"), 740 ILCS 110/, Student Online Personal Protection Act ("SOPPA"), 105 ILCS 85/, Identity Protection Act ("IPA"), 5 ILCS 179/, and Personal Information Protection Act ("PIPA"), 815 ILCS 530/, and Local Records Act (“LRA”), 50 ILCS 205/.

Time is Money Join Law Insider Premium to draft better contracts faster.