E7 Security. The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.
E7 Security. The Contractor shall take all measures necessary to comply with the provisions of any enactment relating to security that may be applicable to the Contractor in the performance of the Services.
E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.
E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures.
E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency.
E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows:
(a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and
(b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).
E7 Security. XXX shall be responsible for maintaining the security of XXX’x premises in accordance with its standard security requirements. The Contractor shall comply with all reasonable security requirements of XXX while on the Premises, and shall procure that all of its employees, agents, servants and sub-contractors shall likewise comply with such requirements.
E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.
E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures.
E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency.
E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows:
E7 Security. The Provider shall take all measures necessary to comply with the provisions of any enactment relating to security that may be applicable to the Provider in the performance of the Services.
E7 Security. Clause Not Used E8 Intellectual Property Rights
E7 Security. E7.1 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
E7.2 Notwithstanding Condition E7.1, if Malicious Software is found, the Parties shall co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of G&S to their desired operating efficiency.
E7.3 Any cost arising out of the actions of the Parties taken in compliance with clause E7.2 shall be borne by the Parties as follows:
(a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and
(b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).
E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on any premises that are required to be worked on as part of this contract (not limited to but including the Authority’s Premises and Local Authorities’ Premises), and shall ensure that all Staff comply with such requirements.
E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures.
E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of G&S to their desired operating efficiency.
E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows:
(a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and
(b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).
E7 Security. The Supplier shall take all measures necessary to comply with the provisions of any enactment relating to security that may be applicable to the Supplier in the performance of the Service.