Common use of Detection Clause in Contracts

Detection. 2.1 Supplier shall monitor its system and its procedures for security breaches, violations and suspicious (questionable) activity. This includes suspicious external activity (including, without limitation, unauthorized probes, scans or break-in attempts) and suspicious internal activity (including, without limitation, unauthorized system administrator access, unauthorized changes to its system or network, system or network misuse or Program Information theft or mishandling).

Appears in 14 contracts

Samples: Financial Reporting Services Agreement, Financial Reporting Services Agreement (BofA Funds Series Trust), Financial Reporting Services Agreement (Columbia Funds Master Investment Trust, LLC)

AutoNDA by SimpleDocs

Detection. 2.1 Supplier shall monitor its system and its procedures for security breaches, violations and suspicious (questionable) activity. This includes suspicious external activity (including, without limitation, unauthorized probes, scans or break-in attempts) and suspicious internal activity (including, without limitation, unauthorized system administrator access, unauthorized changes to its system or network, system or network misuse or Program Information theft or mishandling). 2.2 Reserved 2.3 Reserved 2.4 Reserved 2.5 Reserved

Appears in 2 contracts

Samples: Accounting Services Agreement (BofA Funds Series Trust), Sub Administration Agreement (BofA Funds Series Trust)

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!