Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.
Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.
Computer Tape The computer tape regarding the Receivables made available by the Seller to the Depositor is complete and accurate in all respects as of the Transfer Date.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.
Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes
COMPUTER GRAPHICS FILES The Engineer agrees to comply with Attachment G, Computer Graphics Files for Document and Information Exchange, if determined by the State to be applicable to this contract.
User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.
Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.
COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).
Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.