General Security Standards. At all times during the term of this Contract, Vendor shall maintain a level of security with regard to the Software Products’ system and County Data for which Vendor has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Vendor with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices.
General Security Standards. At all times during the Term, Riskonnect shall maintain a level of security with regard to the RCMIS Systems and County Data for which Riskonnect has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Riskonnect with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices.
General Security Standards. At all times during the Term, Vendor shall maintain a level of security with regard to the Systems, Client Data, Client Software, and those Locations for which Vendor has agreed in this Agreement to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that maintained by the Client with regard to such Systems, Client Data, Client Software, and the Client’s facilities prior to the Service Commencement Date; (b) that maintained by Vendor with regard to its own systems, data, and facilities of a similar nature and import; and (c) that are common and prevalent in the IT industry and in accordance with best industry practices.
General Security Standards. Solely as to information technology infrastructure, including all computers, software, databases, and electronic systems (including database management systems) that Vendor solely manages and Vendor solely controls access to that access County Resources (including County systems), County Data or otherwise in connection with the Services (“Vendor Systems”), Vendor shall prevent unauthorized access to such County Resources (including County systems) or County Data through the Vendor Systems. At all times during the Term, Vendor shall maintain a level of security with regard to the Vendor Systems, that in all events is at least as secure as the levels of security that are common and prevalent in the industry and in accordance with industry best practices. As to Vendor Systems, Vendor shall maintain all appropriate administrative, physical, technical, and procedural safeguards to secure County Data from data breach, protect County Data and the Services to the extent caused by Vendor Systems, from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and the Services.
General Security Standards. At all times during the Term, Vendor shall maintain a level of security with regard to the Systems, Commonwealth Data, Commonwealth Software, and those Locations for which Vendor has agreed in Section 3.10 to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (i) that maintained by the Commonwealth with regard to such Systems, Commonwealth Data, Commonwealth Software, and the Commonwealth’s facilities prior to the Service Commencement Date; (ii) that maintained by Vendor with regard to its own systems, data, and facilities of a similar nature and import; and (iii) that are common and prevalent in the IT industry and in accordance with best industry practices.
General Security Standards. At all times during the Term, Contractor shall maintain a level of security with regard to the eGovernment Systems and County Data for which Contractor has agreed in this Agreement to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that were maintained by the County with regard to such eGovernment Systems and County Data as agreed to during the County/Contractor kick-off meeting; (b) that are maintained by Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (c) that are common and prevalent in the industry and in accordance with industry best practices. Any material breach or violation by Contractor or its Subcontractors, or the employees or agents of any of the foregoing, or of the Security Policies and Principles, shall be deemed a material breach of a material obligation of Contractor under this Agreement, and any chronic or critical breach by Contractor or its Subcontractors, or the employees or agents of any of the foregoing, or of the Security Policies and Principles shall be deemed an incurable and material breach of a material obligation of Contractor under this Agreement. The Parties agree that for the purposes of this Section a breach shall only be deemed material if: (a) Contractor has failed to act in material accordance with the Security Policies and Principles or the security provisions of the procedures manual or the applicable terms of the Scope of Work; or (b) Contractor has failed to use industry best practices and methods in performing its obligations with respect to security services.
General Security Standards. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems, email systems, auditing, and monitoring systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems.
a) Contractor System(s)
General Security Standards. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems) and networks used by or for Contractor (“Contractor Systems”) to access County resources (including County systems), County data or otherwise in connection with the Services and shall prevent unauthorized access to County resources (including County systems) or County data through the Contractor Systems. At all times during the contract term, Contractor shall maintain a level of security with regard to the Contractor Systems, that in all events is at least as secure as the levels of security that are common and prevalent in the industry and in accordance with industry best practices (NIST 800-53). Contractor shall maintain all appropriate administrative, physical, technical, and procedural safeguards to secure County data from data breach, protect County data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, disabling devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County data and the Services.
General Security Standards. Contractor will be solely responsible for the information technology infrastructure, including all computers, software, databases, electronic systems (including database management systems) and networks used by or for Contractor to access County Data or otherwise in connection with the Services (“Contractor Systems”) and shall prevent unauthorized access to County Data through Contractor Systems. At all times during the term, Contractor shall maintain a level of security with regard to Contractor System and County Data for which Contractor has agreed in this Contract to provide or manage physical security, that in all events is at least as secure as each of the following levels of security: (a) that are maintained by Contractor with regard to its own systems, data, and facilities of a similar nature and import; and (b) that are common and prevalent in the industry and in accordance with industry best practices. Contractor shall maintain all appropriate administrative, physical, technical, and procedural safeguards to secure County Data from data breach, protect County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and the Services.
General Security Standards. Contractor will use industry standards and practice to prevent unauthorized access to County systems or County Data through the Software. At all times during the term, Contractor shall maintain a level of security with regard to the Contractor Systems that in all events is at least as secure as the levels of security that are common and prevalent in the industry and in accordance with industry standards and practices. Contractor shall maintain appropriate administrative, physical, technical, and procedural safeguards to secure County Data in