General Security Standards. At all times during the term of this Contract, Vendor shall maintain a level of security with regard to the Software Products’ system and County Data for which Vendor has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Vendor with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices.
General Security Standards. At all times during the Term, Riskonnect shall maintain a level of security with regard to the RCMIS Systems and County Data for which Riskonnect has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Riskonnect with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices.
General Security Standards. At all times during the Term, Vendor shall maintain a level of security with regard to the Systems, Client Data, Client Software, and those Locations for which Vendor has agreed in this Agreement to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that maintained by the Client with regard to such Systems, Client Data, Client Software, and the Client’s facilities prior to the Service Commencement Date; (b) that maintained by Vendor with regard to its own systems, data, and facilities of a similar nature and import; and (c) that are common and prevalent in the IT industry and in accordance with best industry practices.
General Security Standards. Solely as to information technology infrastructure, including all computers, software, databases, and electronic systems (including database management systems) that Vendor solely manages and Vendor solely controls access to that access County Resources (including County systems), County Data or otherwise in connection with the Services (“Vendor Systems”), Vendor shall prevent unauthorized access to such County Resources (including County systems) or County Data through the Vendor Systems. At all times during the Term, Vendor shall maintain a level of security with regard to the Vendor Systems, that in all events is at least as secure as the levels of security that are common and prevalent in the industry and in accordance with industry best practices. As to Vendor Systems, Vendor shall maintain all appropriate administrative, physical, technical, and procedural safeguards to secure County Data from data breach, protect County Data and the Services to the extent caused by Vendor Systems, from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and the Services.
General Security Standards. At all times during the Term, Contractor shall maintain a level of security with regard to the eGovernment Systems and County Data for which Contractor has agreed in this Agreement to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that were maintained by the County with regard to such eGovernment Systems and County Data as agreed to during the County/Contractor kick-off meeting; (b) that are maintained by Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (c) that are common and prevalent in the industry and in accordance with industry best practices. Breach of Security Any material breach or violation by Contractor or its Subcontractors, or the employees or agents of any of the foregoing, or of the Security Policies and Principles, shall be deemed a material breach of a material obligation of Contractor under this Agreement, and any chronic or critical breach by Contractor or its Subcontractors, or the employees or agents of any of the foregoing, or of the Security Policies and Principles shall be deemed an incurable and material breach of a material obligation of Contractor under this Agreement. The Parties agree that for the purposes of this Section a breach shall only be deemed material if: (a) Contractor has failed to act in material accordance with the Security Policies and Principles or the security provisions of the procedures manual or the applicable terms of the Scope of Work; or (b) Contractor has failed to use industry best practices and methods in performing its obligations with respect to security services.
General Security Standards. At all times during the Term, the Contractor shall maintain a level of security with regard to the Agenda System and County Data for which the Contractor has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by the Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices. Breach of Security: Any material breach or violation by the Contractor or its subcontractors, or the employees or agents of any of the foregoing, of the Security Policies, shall be deemed a material breach of a material obligation of the Contractor under this Contract, and any chronic or critical breach by the Contractor or its subcontractors, or the employees or agents of any of the foregoing, of the Security Policies, shall be deemed an incurable and material breach of a material obligation of the Contractor under this Contract, which may result in an immediate termination by the County for cause, pursuant to Section K herein.
General Security Standards. Contractor is solely responsible for the Contractor Resources used by or for Contractor to access County Resources, County Data or otherwise in connection with the Services and must prevent unauthorized access to County Resources or County Data through the Contractor Resources. At all times during the term, Contractor must maintain a level of security with regard to the Contractor Resources, that in all events is at least as secure as the levels of security that are common and prevalent in the industry and in accordance with industry best practices. Contractor must maintain all appropriate administrative, physical, technical, and procedural safeguards and controls to secure County Data from data breach, protect County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and the Services. Such measures must include at a minimum: (a) access controls on information systems, including controls to authenticate and permit access to County Data only to authorized individuals and controls to prevent Contractor employees from providing County Data to unauthorized individuals who may seek to obtain this information; (b) industry-standard firewall protection; (c) encryption of electronic County Data while in transit from Contractor networks to external networks; (d) measures to store in a secure fashion all County Data which must include but not be limited to, encryption at rest and multiple levels of authentication; (e) dual control procedures, segregation of duties, and pre-employment criminal background checks from employees with responsibilities for or access to County Data; (f) measures to ensure that County Data is not altered or corrupted without the prior written consent of County; (g) measures to protect against destruction, loss or damage of County Data due to potential environmental hazards, such as fire and water damage; (h) staff training to implement the information security measures; and (i) monitoring of the security of any portions of Contractor Resources that are used in the provision of the Services against intrusion on a twenty-four hour a day basis.
General Security Standards. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems) and networks used by or for Contractor to access County Data or otherwise in connection with the Services (“Contractor Systems”) and shall prevent unauthorized access to County Data through Contractor Systems. At all times during the term, Contractor shall maintain a level of security with regard to Contractor System and County Data for which Contractor has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices. Contractor shall maintain all appropriate administrative, physical, technical, and procedural safeguards to secure County Data from data breach, protect County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and the Services.
General Security Standards. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems. WGM0719-A3 Page 3 of 7 July 9, 2024
General Security Standards. Contractor will use industry standards and practice to prevent unauthorized access to County systems or County Data through the Software. At all times during the term, Contractor shall maintain a level of security with regard to the Contractor Systems that in all events is at least as secure as the levels of security that are common and prevalent in the industry and in accordance with industry standards and practices. Contractor shall maintain appropriate administrative, physical, technical, and procedural safeguards to secure County Data in Orange County Information Technology Page 31 of 122 Redline_MA-017-18010489 AssetWorks, LLC Folder No.:C003855 Computerized Maintenance Management System Contractor’s possession from data breach, protect such County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and the Services, to the extent not directly caused by County.