Cybersecurity Enhancements Sample Clauses

Cybersecurity Enhancements. 2 2.5.1 Faneuil has agreed to implement and maintain certain cybersecurity 3 and business practice enhancements after the Data Incident and due to this Settlement. The 4 enhancements are detailed in Exhibit 6 to this agreement.
AutoNDA by SimpleDocs
Cybersecurity Enhancements. If Client has elected to Decline any Cybersecurity Enhancements. Notwithstanding any other provision herein: Wherefore, having declined the Cybersecurity Enhancements Client acknowledges that MSP will not be providing enhanced cybersecurity protections which may increase the risk of cyberattacks against Client’s network security and any damages which may result therefrom. Client hereby Releases and waives all claims against MSP and the MSP Release Parties; Client further covenants to Release and not to xxx, release, hold harmless, defend and indemnify the MSP Release Parties in relation to all claims, damages, suits, demands, trials, tribunals, dispute resolution proceedings and causes of action arising from any consequences resulting from failure (including (but not limited to) inadvertence, mistake, negligence, gross negligence or willful misconduct of Client and Affiliates of Client, owners, managers, employees, agents, contractors, members, shareholders, officers, directors, professionals, experts, vendors, successors and assigns) of Client to accept cybersecurity enhancements in order to lower the risk of cyberattacks and all damages resulting therefrom.
Cybersecurity Enhancements. Client acknowledges that MID provides basic cyber security in the forms of Web Based Security Training, Anti-Malware Software, DNS Protection, and Email Filtering and provides them on a “best efforts” basis. Provided security services do not constitute Compliance, Managed Security Service Provider, or SOC solutions which are part of the Cybersecurity Enhancement packages. MID will offer a Cybersecurity Enhancements package, which if declined, Client acknowledges that MID will not be providing enhanced cybersecurity protections which may increase the risk of cyberattacks against Client’s network security and any damages which may result therefrom. Client acknowledges that no Cybersecurity is foolproof, and Client hereby Releases and waives all claims against MID and the MID Release Parties; Client further covenants to Release and not to xxx, release, hold harmless, defend and indemnify the MID Release Parties in relation to all claims, damages, suits, demands, trials, tribunals, dispute resolution proceedings and causes of action arising from any consequences resulting from failure (including (but not limited to) inadvertence, mistake, negligence, gross negligence or willful misconduct of Client and Affiliates of Client, owners, managers, employees, agents, contractors, members, shareholders, officers, directors, professionals, experts, vendors, successors and assigns) of Client to accept cybersecurity enhancements in order to lower the risk of cyberattacks and all damages resulting therefrom.

Related to Cybersecurity Enhancements

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Security Clearances A. The General Contractor is to supply the Department of Corrections with full names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted a minimum of two (2) weeks prior to access to the site. The Department of Corrections has final word on who will be permitted access to the site. A form for this purpose is attached for your use.

  • Trademark Clearinghouse 4.1 Notwithstanding the requirements of Section 2.8 of the Agreement, Section 1 of Specification 7 to the Agreement and Section 2 of the Trademark Clearinghouse Rights Protection Mechanism Requirements (the “TMCH Requirements”), Registry Operator is not required to provide a Sunrise Period (as defined in the TMCH Requirements) or, except as set forth herein, otherwise comply with the obligations set forth in Section 2 of the TMCH Requirements (collectively, the “Sunrise Requirements”) so long as the TLD continues to be qualified as a .Brand TLD by ICANN.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

Time is Money Join Law Insider Premium to draft better contracts faster.