Common use of E7 Security Clause in Contracts

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).

Appears in 11 contracts

Samples: Contract for the Provision of Services, Contract for Expanding Defra’s Modelling Capacity to Assess Wider Impacts of Air Quality Policy, Contract for the Provision of Services

AutoNDA by SimpleDocs

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Authority‟s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Authority‟s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).

Appears in 9 contracts

Samples: Contract for Services, Contract for the Provision of Services, Contract for the Provision of Services

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Authority‟s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Authority‟s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition clause E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).

Appears in 6 contracts

Samples: Framework Agreement, Framework Agreement, Framework Agreement

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).

Appears in 5 contracts

Samples: Contract for the Provision of Services, Contract for Evaluating the Potential of Constructed Wetland Features, Contract for the Provision and Management of the Rural Community Building Loan Fund

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services G&S to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).

Appears in 3 contracts

Samples: Contract for the Provision of Goods and Services, Contract for the Provision of Services, Contract for the Provision of Air Quality Monitoring Housing & Gaseous Analysers

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services Goods to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).

Appears in 3 contracts

Samples: Purchase Agreement, Purchase Agreement, Purchase Agreement

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-anti- virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition clause E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).

Appears in 2 contracts

Samples: Framework Agreement, Framework Agreement

AutoNDA by SimpleDocs

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Authority‟s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Authority‟s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority). E7.6 The total costs if any to be borne by the Contractor under Clause E7.5(a) shall not exceed £2 million.

Appears in 1 contract

Samples: Contract for the Provision of Services

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Authority‟s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Authority‟s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services G&S to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).

Appears in 1 contract

Samples: Contract for the Provision of Services

E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority). E7.6 The total costs if any to be borne by the Contractor under Clause E7.5(a) shall not exceed £2 million.

Appears in 1 contract

Samples: Contract for the Provision of Services

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!