Cybersecurity Standards Sample Clauses

Cybersecurity Standards. The Contractor shall comply with governmental IT and cybersecurity standards that have been adopted by the Companies including any updates made from time to time in the performance of the Services (as applicable) including but not limited to following: (a) The Contractor shall inform the Company’s BME representative as and when the validated updates by the Contractor to the Software including IT security patches necessary to fix a vulnerability or as required as part of upcoming routine updates necessary to operate the Equipment safely are available provided that (i) the Contractor becomes aware of a vulnerability which is not classified as irrelevant or that could be exploited by a cybersecurity threat, and (ii) in the case of third party software the third party software provider has issued the respective patch to the Contractor. For avoidance of doubt, (i) IT security patches aforementioned shall be provided to the Company at no cost; and (ii) the purchase, implementation and timing of other upgrades depending on the severity of the vulnerability and not pertaining to cybersecurity vulnerabilities shall be determined by the Company in its sole discretion and at its own cost. (b) The Contractor shall provide assistance to update or provide information of the Equipment whenever required by the Company. This shall include but not be limited to on-site support, USB port blocking, Network Segmentation, creation/deletion of accounts on the Equipment and enable/disable/changing of passwords. Should there be any cost involved in rendering such assistance, the Contractor shall make known to the Company before the start of any abovementioned works. (c) The Contractor shall not use or plug into the Company’s network any all removable storage media, devices and, or equipment that are not supplied by the Company without first obtaining clearance from the Company’s IT Department through BME representative. All removable storage media shall be scanned for malware in the presence of the Company before the necessary files are transferred to a Company- approved removable storage media for purpose of providing the Services. (d) The Contractor shall ensure there is no Internet connection to any of its devices/equipment under any and all circumstances, unless otherwise approved by the Company. This shall be applicable for all Contractor’s devices and loan equipment used during the course of the Services and updates and upgrades of the Software. (e) All Contractor’s devices/...
AutoNDA by SimpleDocs

Related to Cybersecurity Standards

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • Safety Standards Performance of the Contract for all commodities or contractual services must comply with requirements of the Occupational Safety and Health Act and other applicable State of Florida and federal requirements.

  • Quality Standards Each Party agrees that the nature and quality of its products and services supplied in connection with the other Party's Marks will conform to quality standards set by the other Party. Each Party agrees to supply the other Party, upon request, with a reasonable number of samples of any Materials publicly disseminated by such Party which utilize the other Party's Marks. Each Party will comply with all applicable laws, regulations, and customs and obtain any required government approvals pertaining to use of the other Party's marks.

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • OMB Standards Unless specified otherwise within this agreement, the Subrecipient shall procure all materials, property, or services in accordance with the requirements of 24 CFR 84.40−48.

  • Property Standards Owner must maintain the Unit, and any common areas of the property accessible to the Tenant under the Lease, in decent, safe and sanitary condition and comply with all applicable state or local codes and requirements for rental properties. Upon notice by the Program Administrator following any inspection (whether conducted in-person or virtually in accordance with the Program guidelines), Owner will promptly correct any violations of Program requirements and this Contract. If the Owner fails to correct such violations, the Program Administrator may terminate this Contract and the Rental Assistance Payment even if the Tenant continues occupancy under the Lease. Owner/Representative Initials:

  • Service Level Standards In addition to all other requirements in this Agreement, and in accordance with the Best Claims Practices & Estimating Guidelines, Vendor shall use reasonable and good faith efforts to meet the Service Level Standards set forth below.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!