Computer System Security Sample Clauses

Computer System Security. Company agrees to maintain and regularly update the security of its computer software, hardware network or system or Wireless Devices ("Computer System"), through which Company, Administrators or Users access the Services, including, without limitation, by installing, maintaining and regularly updating anti-virus and antispyware identification and removal software and other deterrent systems reasonably necessary to prevent unauthorized access to Company's Computer System. Company agrees to take reasonable precautions to prevent the introduction of any disabling procedures, including but not limited to, software lock, malicious logic, worm, Trojan horse, bug, or time bomb) into Software that might disrupt Equipment or Software, or the equipment or software of other Users of the Services. CHECK SERVICES CHECK POSITIVE PAY‌
AutoNDA by SimpleDocs
Computer System Security. (1) The Bonded Web User shall place network and system devices used in the Bonded Web User Program and DMV interface in secure areas. The Bonded Web User shall control access to these devices and shall limit access to, and viewing of (if appropriate), these devices to individuals that have completed and signed an Information Security and Disclosure Statement, Public and Private Partnerships Employee form submitted during the application process for participation in the Bonded Web User Program. (2) Workstations and printers utilized to access the DMV’s IRP vehicle registration and inventory databases and display or print DMV records shall be located within the Bonded Web User’s site or facility in such a manner that displayed or printed records are not visible or accessible to unauthorized employees or the general public. (3) Workstations and printers utilized to access the DMV’s IRP vehicle registration and inventory databases and display or print DMV records, shall be secured to the business site or facility by means of a security cabling system, or physically affixing the workstation or printer to an enclosure or fixture/furniture located within the business site or facility. (4) Workstations displaying DMV records or the DMV’s IRP vehicle registration and inventory databases information shall display an electronic “admonishment warning banner” to the user at the time of access initiation. The banner shall contain the following language: “WARNING: Unauthorized access or misuse of data may result in disciplinary action, civil penalties and/or criminal prosecution.” (5) Workstations shall not be left unattended while accessing the DMV’s IRP vehicle registration and inventory databases. Workstations shall be configured to either programmatically end access or invoke a display obfuscation screen after a maximum of ten (10) continuous minutes of inactivity. Once access has ended or the display screen has been obfuscated, the user shall be required to re-authenticate to the authentication credentialing system prior to re-establishing access or un-obscuring the display.

Related to Computer System Security

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • Provisional Interconnection Service Upon the request of Interconnection Customer, and prior to completion of requisite Interconnection Facilities, Network Upgrades, Local Upgrades, or system protection facilities Interconnection Customer may request limited Interconnection Service at the discretion of Transmission Provider based upon an evaluation that will consider the results of available studies, which terms shall be memorialized in the Interconnection Service Agreement. Consistent with Tariff, Part VI, Subpart B, section 212.4, Interconnection Customer may execute the Interconnection Service Agreement, request dispute resolution or request that the Interconnection Service Agreement be filed unexecuted with the Commission. Transmission Provider shall determine, through available studies or additional studies as necessary, whether stability, short circuit, thermal, and/or voltage issues would arise if Interconnection Customer interconnects without modifications to the Generating Facility or the Transmission System. Transmission Provider shall determine whether any Interconnection Facilities, Network Upgrades, Local Upgrades, or system protection facilities that are necessary to meet the requirements of NERC, or any applicable Regional Entity for the interconnection of a new, modified and/or expanded Generating Facility are in place prior to the commencement of Interconnection Service from the Generating Facility. Where available studies indicate that such Interconnection Facilities, Network Upgrades, Local Upgrades, and/or system protection facilities that are required for the interconnection of a new, modified and/or expanded Generating Facility are not currently in place, Transmission Provider will perform a study, at the Interconnection Customer’s expense, to confirm the facilities that are required for Provisional Interconnection Service. The maximum permissible output of the Generating Facility shall be studied and updated annually and at the Interconnection Customer’s expense. The results will be communicated to the Interconnection Customer in writing upon completion of the study. Interconnection Customer assumes all risk and liabilities with respect to the Provisional Interconnection Service, including changes in output limits and Interconnection Facilities, Network Upgrades, Local Upgrades, and/or system protection facilities cost responsibilities.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!