CYBERSECURITY SERVICES Sample Clauses

CYBERSECURITY SERVICES a. With respect to any cybersecurity-related Services, Software, SaaS or related hardware (“Cybersecurity Deliverables”), Honeywell may provide professional judgment, technical expertise, and advice regarding Buyer’s cyber risk management program. As system performance and security are subject to multiple factors outside of Honeywell’s control, Honeywell does not warrant or guarantee that Cybersecurity Deliverables will prevent or mitigate acts or attempts to disrupt, misuse, or gain unauthorized access to any system or electronic facilities or operations that results in a loss, alteration or disclosure of data, system downtime or degradation or loss of operation or services (an “Event”). Honeywell will use industry standard virus detection software designed to protect against viruses. Buyer or any End User is responsible for its own cyber risk management program and must participate in Buyer’s or End User’s own defense and manage cyber risk throughout Buyer’s or End User’s own cyber risk management program. Honeywell shall have no liability in connection with any Event, except to the extent the Event was caused by failure of a Honeywell Product, Software, or Services provided by Honeywell to materially perform in accordance with the written specifications and any related documentation (including any technical or legal requirements) specifically provided with a Cybersecurity Deliverable or specifically referenced in a Proposal (but excluding marketing materials, customer correspondence and similar collateral), in which case Honeywell’s sole liability and Buyer’s or End User’s exclusive remedy in respect of an Event, is the replacement, repair or re-performance of, or refund of the portion of the fees paid and attributable to, the defective Deliverables in accordance with the terms and conditions of the applicable warranty for the defective Deliverable. This Clause shall take precedence over any other Clause in this Agreement. b. Buyer represents and warrants that, to the extent it is using the Cybersecurity Deliverables, it will (i) use commercially reasonable administrative, physical and technical safeguards to protect Buyer’s systems, facilities, operations or data or follow industry-standard or other mutually agreed upon security practices; (ii) update to the latest version of relevant Software and follow the current Documentation for the same; (iii) make no modifications or alterations to any hardware or Software comprising the Cybersecurity Deliverabl...
CYBERSECURITY SERVICES. With respect to any cybersecurity-related Services, software, SaaS or related hardware (“Cybersecurity Services”), Honeywell may provide professional judgment, technical expertise, and advice regarding Buyer’s cyber risk management program. As system performance and security are subject to multiple factors outside of Honeywell’s control, Honeywell does not warrant or guarantee the Cybersecurity Services will prevent or mitigate any act or attempt to disrupt, misuse, or gain unauthorized access to any system or electronic facilities or operations that results in a loss, alteration or disclosure of data, system downtime or degradation or loss of operation or services relating to the Cybersecurity Services (an “Event”). Xxxxx agrees and understands that Honeywell cannot and does not, and that by working with Honeywell or using Offerings, Buyer may not prevent Events (either actual or attempted). Xxxxx agrees and expressly acknowledges that Buyer is responsible for its own cyber risk management program, including those responsibilities set forth in this section and in this Agreement, and must participate in Buyer’s own defense and work with Honeywell to create a prioritized, flexible, repeatable, performance-based, and cost-effective process to identify, assess, and manage cyber risk throughout Buyer’s enterprise. Honeywell shall have no liability in connection with any Event unless the Event was caused by defective Products, Software or Services provided by Honeywell, in which case Honeywell’s sole liability and Buyer’s exclusive remedy in respect of an Event is the replacement or repair of defective Products or Software, or re-performance of defective services under the applicable warranty in this Agreement.
CYBERSECURITY SERVICES. You acknowledge that to the extent reasonably required for Threat Spectrum to provide the Cybersecurity Services, You may be required to provide Threat Spectrum or its personnel with (a) information regarding Your online accounts and activities, including personal information, usernames, passwords, and/or email addresses, and (b) access to online accounts and information technology equipment (such as modems, routers, access points, and/or similar equipment). You may refuse to provide any such information or access, however, You acknowledge and agree that Threat Spectrum is not liable for any inability to perform the Cybersecurity Services in such circumstances. Threat Spectrum recommends that You change your account passwords regularly. You acknowledge that (i) You are solely responsible for recording and maintaining all of Your applicable account access information, including Your usernames, passwords, encryption keys, encryption seeds, account numbers, and pin numbers, and (ii) a failure to record and maintain such information may result in a loss of access to Your accounts that cannot be recovered. You further acknowledge that a loss of access to any of Your accounts may result in loss of data and/or loss of property such as cryptocurrency or online purchases associated with Your account. Threat Spectrum does not record and/or maintain any of Your account access information and is not responsible for Your failure to do so.
CYBERSECURITY SERVICES. Should the Quotation include security scanning, testing, assessment, remediation or similar services (“Cybersecurity Services”), Client understands that UL Contracting Party may use various methods and software tools to probe for security-related information and to detect actual or potential security flaws and vulnerabilities. Client authorizes UL Contracting Party to perform such Cybersecurity Services (and all tasks and tests reasonably contemplated by or reasonably necessary to perform the Cybersecurity Services) on systems or resources identified by Client. Client represents that, if Client does not own such systems or resources, it will have obtained consent and authorization from the applicable third party to permit UL Contracting Party to provide the Cybersecurity Services. Client shall disclose to UL Contracting Party in advance any information reasonably necessary to safely and securely conduct the Services; any networks, systems, configurations or data of heightened sensitivity or risk; and anything that should be excluded from testing. Testing tools and methods have inherent risks. It is Client’s responsibility to ensure the product or system tested is not connected to systems or networks with sensitive information that could be put at risk. Client shall provide a point of contact to UL Contracting Party during testing. UL Contracting Party agrees to notify and work with the Client point of contact during testing if either party identifies a potentially significant degradation, interruption or other impact. UL Contracting Party shall perform Cybersecurity Services during a timeframe mutually agreed upon with Client. Client acknowledges and accepts that the Cybersecurity Services could possibly result in service interruptions or degradation regarding Client’s systems and accepts those risks and consequences. Client agrees that it is Client’s responsibility to restore network computer systems to a secure configuration after the completion of UL Contracting Party’s testing.
CYBERSECURITY SERVICES. Client acknowledges that although Consultant agrees to comply with the provisions of Article I.4 with respect to Consultant’s system, in Consultant’s provision of cybersecurity services under a Statement of Work, Client retains responsibility for: (A) determining, at the time of the entering into of the Statement of Work and thereafter from time to time during the continuance of the Statement of Work, Client’s security requirements, infrastructure, landscape, policies, and protocols (“Client Security Requirements”)and ensuring that the Client Security Requirements comply with all applicable laws, meet Client’s business requirements, and comply with Client’s applicable internal guidelines, long-term goals, any third-party agreements; and (B) communicating the Client Security Requirements to Consultant and determining that the level of cybersecurity services purchased by Client and provided by Consultant under the applicable Statement of Work will enable Client to meet the Client Security Requirements. Consultant shall not be responsible or liable for any Security Breach in its provision of cybersecurity services under any Statement of Work except to the extent that Consultant breaches its obligations to provide such cybersecurity services under this Agreement and such breach by Consultant is the cause of the Security Breach; and in such an event, Consultant’s liability shall be subject to Articles VII.5.A and VII.5.C. To be clear, if Consultant complies with its obligations to provide cybersecurity services under a Statement of Work and a Security Breach nevertheless occurs, Consultant has no liability for the Security Breach as no service provider, including Consultant, can guaranty that no Security Breach will occur.
CYBERSECURITY SERVICES. 24.1 The Client accepts that the actual quality and applicability for the Client of the Cybersecurity Services described in an Agreement and to be provided by the Contractor, (also) depends on: a. timely compliance by the Client with growth plans discussed and agreed between the Contractor and the Client from a low (maturity) level of security to a higher (maturity) level, and more generally, timely compliance with instructions, execution of (project) plans and implementation and execution of information security policies; b. the provision by the Client to the Contractor of a complete and correct network architecture diagram of the Client's industrial communication network to be secured; and c. the continuous updating by the Client of the proprietary network and system software of each individual node (i.e. node and/or endpoint) within the Client's industrial communication network to be secured according to instructions from the relevant manufacturer and any applicable instructions from the Contractor. 24.2 The Client declares that it is neither a provider of an essential service nor a provider of another service whose continuity is of vital importance to Dutch society. The Client shall actively inform Contractor of any qualification of the Client as a provider of an essential service or provider of another service whose continuity is of vital importance to Dutch society as referred to in the Network and Information Systems Security Act (WBNI). Unless expressly agreed otherwise, the Cybersecurity Services do not purport to meet the requirements of the WBNI. 24.3 The Client must have a risk management and control system that meets the requirements of ISO 31000 (Risk Management). This system includes the operational information technology within the Client's business. The Client shall allow the Contractor to inspect the system for the purpose of determining which identified risks of breaching the security of the operational information technology could cause serious harmful consequences upon occurrence, such as flooding (e.g. flooding of a polder or residential area), fire, reactor meltdown, major explosions (e.g. e.g. detonation of fertiliser or ammunition), serious water, soil and air pollution (e.g. unlawful discharge of untreated sewage to surface water), general damage to public health (e.g. generation of chlorine gas due to improper chlorine additions), contamination of food (sources) and/or pollution or damage to utilities. 24.4 If, on the basis of th...

Related to CYBERSECURITY SERVICES

  • Surgery Services This plan covers surgery services to treat a disease or injury when: • the operation is not experimental or investigational, or cosmetic in nature; • the operation is being performed at the appropriate place of service; and • the physician is licensed to perform the surgery. This plan covers reconstructive surgery and procedures when the services are performed to relieve pain, or to correct or improve bodily function that is impaired as a result of: • a birth defect; • an accidental injury; • a disease; or • a previous covered surgical procedure. Functional indications for surgical correction do not include psychological, psychiatric or emotional reasons. This plan covers the procedures listed below to treat functional impairments. • abdominal wall surgery including panniculectomy (other than an abdominoplasty); • blepharoplasty and ptosis repair; • gastric bypass or gastric banding; • nasal reconstruction and septorhinoplasty; • orthognathic surgery including mandibular and maxillary osteotomy; • reduction mammoplasty; • removal of breast implants; • removal or treatment of proliferative vascular lesions and hemangiomas; • treatment of varicose veins; or • gynecomastia.

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

  • Utility Services Company agrees to pay the full cost and expense associated with its use of all utilities, including but not limited to water, sanitary sewer, electric, storm drainage, and telecommunication services.

  • Cloud Services Unless otherwise stated in the Agreement or in the Order, Company grants Customer a limited, non-transferable, non-sublicenseable, non-exclusive, worldwide license to access and use the Number of Units of Cloud Services during the Term solely for internal business purposes in accordance with the applicable license restrictions stated in the Business Unit Terms, Order, and Documentation. Additional Cloud Service Terms are stated at xxxxx://xxxxx.xxxxx.xxx/#cloud-services, which are incorporated by reference.

  • Beta Services From time to time, We may invite You to try Beta Services at no charge. You may accept or decline any such trial in Your sole discretion. Beta Services will be clearly designated as beta, pilot, limited release, developer preview, non-production, evaluation or by a description of similar import. Beta Services are for evaluation purposes and not for production use, are not considered “Services” under this Agreement, are not supported, and may be subject to additional terms. Unless otherwise stated, any Beta Services trial period will expire upon the earlier of one year from the trial start date or the date that a version of the Beta Services becomes generally available. We may discontinue Beta Services at any time in Our sole discretion and may never make them generally available. We will have no liability for any harm or damage arising out of or in connection with a Beta Service.