Computer System Security Requirements Sample Clauses

Computer System Security Requirements. To the extent that Supplier electronically stores or transmits Protected Information or has access to any UC Information Resources, it will include in its written, comprehensive Information Security Plan the establishment and maintenance of a security system covering its computers, including any wireless system, that, at a minimum, and to the extent technically feasible, will have the following elements:
AutoNDA by SimpleDocs
Computer System Security Requirements. To the extent that Contractor electronically stores or transmits Confidential Information or has access to any ETF Information Resources, it will include in its written, comprehensive Information Security Plan the establishment and maintenance of a security system covering its computers, including any wireless system, that, at a minimum, and to the extent technically feasible, will have the following elements:
Computer System Security Requirements. 1. If Supplier or Supplier Personnel electronically stores or transmits PII or HCI, its written WISP shall include the establishment and maintenance of a security system covering its computers, including any wireless system that, at a minimum, shall have the following elements:
Computer System Security Requirements. Supplier shall include in its information security program a computer security system that complies with the Security Rule, including but not limited to the following elements: .Secure user authentication protocols including:

Related to Computer System Security Requirements

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Computer Systems (a) The Computer Systems adequately meet the data processing and other computing needs of the Business as presently conducted. The Computer Systems function, operate, process and compute in accordance with all Applicable Laws, industry standards and trade practices. The Computer Systems operate and perform in all material respects in accordance with their documentation and functional specifications. The Computer Systems have not materially malfunctioned or failed within the past three years.

  • Personal Property Requirements The Collateral Agent shall have received:

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Furniture, Fixtures and Equipment Sublessee shall have the right to use during the Term the office furnishings and equipment within the Subleased Premises that are identified on Exhibit C attached hereto, as such exhibit may be adjusted by mutual agreement of the parties prior to the Third Floor Premises Delivery Date (the “Furniture”), provided Sublessee may only use the Furniture located in the Second Floor Premises after the Second Floor Commencement Date. The Furniture is provided in its “AS IS, WHERE IS” condition, without representation or warranty whatsoever. Sublessee shall insure the Furniture under the property insurance policy required under the Master Lease, as incorporated herein, and pay all taxes with respect to the Furniture. Sublessee shall maintain the Furniture in good condition and repair, reasonable wear and tear excepted, and shall be responsible for any loss or damage to the same occurring during the Term. Sublessee shall surrender the Furniture to Sublessor upon the termination of this Sublease in the same condition as exists as of the applicable Delivery Date, reasonable wear and tear excepted. Sublessee shall not remove any of the Furniture from the Subleased Premises. Notwithstanding anything to the contrary herein, Sublessee may provide Sublessor with written notice one (1) time not less than forty-five (45) days prior to the Third Floor Premises Delivery Date that lists any items of Furniture that Sublessee does not want to use and Sublessor shall, at no cost to Sublessee, remove such items from the Subleased Premises prior to the Third Floor Premises Delivery Date and such items shall no longer be considered Furniture hereunder. Notwithstanding the foregoing, provided Sublessee is not in default beyond the expiration of any applicable cure or grace period as of the date of the expiration or earlier termination of this Sublease, which condition may be waived by Sublessor in its sole discretion, then upon the expiration or earlier termination of this Sublease, the Furniture shall become the property of Sublessee, and Sublessee shall accept the same in its “AS IS, WHERE IS” condition, without representation or warranty whatsoever except as provided in the Bill of Sale referred to in the following sentence. In the event the Furniture is to become the property of Sublessee upon the expiration or earlier termination of this Sublease pursuant to the terms of the immediately preceding sentence, then Sublessor agrees to execute and deliver to Sublessee a Bill of Sale in the form of Exhibit D attached hereto conveying and transferring to Sublessee the Furniture.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Quality Requirements Performance Indicator Heading Indicator (specific) Threshold Method of Measurement Frequency of monitoring Consequence of Breach QUALITY Patient Safety - Incidents I1 Number of incidents Adverse incidents include the following: clinical or non clinical adverse events that have potential to cause avoidable harm to a patient, including medical errors or adverse events related to medical devices or other equipment. Clinical or non- clinical accidents, accidental injuries to staff and members of the public, verbal, physical or psychological abuse or harassment, unusual or dangerous occurrences, damage to trust property, plant or equipment, fire or flood, security, theft or loss, near misses are identified as any event where under different circumstances significant injury or loss may have occurred Number of recorded incidents in the contract month Monthly Remedial Action Plan brought to Performance Meeting following breach; action under Module C Clause 32 if needed I2 Number of Sis Definition of SUI according to trust policy and national guidance Number of Serious Untoward Incidents reported in contract month Monthly Remedial Action Plan brought to Performance Meeting following breach; action under Module C Clause 32 if needed S1 Percentage of eligible staff received child safeguarding training at level 2 (as identified in LSCB training strategy) 95% Number received training/ Number of identified staff requiring training Monthly S2 Percentage of eligible staff received adult safeguarding awareness training at level 2 ( as identified in K&M Safeguarding Vulnerable Adults training strategy) 95% Number of staff trained/ Number of identified staff requiring training Monthly

Time is Money Join Law Insider Premium to draft better contracts faster.