Common use of Detection Clause in Contracts

Detection. 2.1 Supplier shall monitor its system and its procedures for security breaches, violations and suspicious (questionable) activity. This includes suspicious external activity (including, without limitation, unauthorized probes, scans or break-in attempts) and suspicious internal activity (including, without limitation, unauthorized system administrator access, unauthorized changes to its system or network, system or network misuse or Program Information theft or mishandling).

Appears in 16 contracts

Samples: Financial Reporting Services Agreement, Sub Administration Agreement (BofA Funds Series Trust), Accounting Services Agreement (BofA Funds Series Trust)

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.