CONNECTED OPERATIONS SECURITY PROGRAM Sample Clauses

CONNECTED OPERATIONS SECURITY PROGRAM. ServiceNow may use a cloud provider for Infrastructure as a Service (IaaS). The cloud provider used by ServiceNow shall maintain an ISO27001 certification. ServiceNow may periodically review and update the ServiceNow Connected Operations DSG to address new and evolving security technologies, changes to industry standard practices, and changing security threats, although no such update will materially reduce the commitments, protections or overall level of service described herein.
AutoNDA by SimpleDocs

Related to CONNECTED OPERATIONS SECURITY PROGRAM

  • Operations Security Supplier must enable logging and monitoring on all operating systems, databases, applications, and security and network devices that are involved in providing Deliverables. Supplier will maintain anti-malware controls that are designed to protect systems from malicious software, including malicious software that originates from public networks. In addition, Supplier will use anti-malware software (of Industry Standard or better quality), maintain such software at the then current major release, purchase maintenance & support available from the vendor for such software, and promptly implement new releases and versions of such software.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Default – Reprocurement Costs In case of Contract breach by Contractor, resulting in termination by the County, the County may procure the goods and/or services from other sources. If the cost for those goods and/or services is higher than under the terms of the existing Contract, Contractor will be responsible for paying the County the difference between the Contract cost and the price paid, and the County may deduct this cost from any unpaid balance due the Contractor. The price paid by the County shall be the prevailing market price at the time such purchase is made. This is in addition to any other remedies available under this Contract and under law.

  • Commercial Items The Software, including all related documentation, are “Commercial Item(s),” as that term is defined at 48 C.F.R. Section 2.101, consisting of “Commercial Computer Software” and “Commercial Computer Software Documentation,” as such terms are used in 48 C.F.R. Section 12.212 or 48 C.F.R. Section 227.7202, as applicable. Consistent with 48 C.F.R. Section 12.212 or 48 C.F.R. Sections 227.7202-1 through 227.7202-4, as applicable, the Commercial Computer Software and Commercial Computer Software Documentation are being licensed to U.S. Government end users (i) only as Commercial Items; and (ii) with only those rights as are granted to all other end users pursuant to the terms and conditions herein. Unpublished-rights reserved under the copyright laws of the United States.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Divestment costs etc 34.5.1 The Concessionaire shall bear and pay all costs incidental to divestment of all of the rights, title and interest of the Concessionaire in the Project in favour of the Authority upon Termination, save and except that all stamp duties payable on any deeds or Documents executed by the Concessionaire in connection with such divestment shall be borne by the Authority.

  • Excess/Umbrella Liability Policies Required insurance coverage limits may be provided through a combination of primary and excess/umbrella liability policies. If coverage limits are provided through excess/umbrella liability policies, then a Schedule of underlying insurance listing policy information for all underlying insurance policies (insurer, policy number, policy term, coverage and limits of insurance), including proof that the excess/umbrella insurance follows form must be provided after renewal and/or upon request.

  • Account Monitoring Merchant acknowledges that Servicer will monitor Merchant’s daily deposit activity. Servicer may upon reasonable grounds suspend disbursement of Merchant's funds for any reasonable period of time required to investigate suspicious or unusual deposit activity. Servicer will make good faith efforts to notify Merchant promptly following suspension. Servicer is not liable to Merchant for any loss, either direct or indirect, which Merchant may attribute to any suspension of funds disbursement.

  • Cost Responsibility for Interconnection Facilities and Distribution Upgrades 4.1 Interconnection Facilities 4.2 Distribution Upgrades

Time is Money Join Law Insider Premium to draft better contracts faster.