We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Information and System Security Sample Clauses

Information and System Security. Servicer shall provide the Services in conformance with the respective Servicee’s terms and conditions set forth in Annex C.
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with Washington State’s OCIO’s and CTS’s security policies, as well as any other policy of Washington State that is still in effect, which may include the Information Services Board Security Policy, Standards and Guidelines, and the CTS Site and Security Policy attached hereto as Exhibit C, and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, self-help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of Purchaser’s network, system or data. Any written commitment by Vendor within the scope of this Contract shall be binding upon Vendor. Failure of Vendor to fulfill such a commitment may constitute breach and shall render Vendor liable for damages under the terms of this Contract. For purposes of this section, a commitment by Vendor includes: (i) Prices, discounts, and options committed to remain in force over a specified period of time; and (ii) any warranty or representation made by Vendor in its Response (if any) or contained in any Vendor or manufacturer publications, written materials, schedules, charts, diagrams, tables, descriptions, other written representations, and any other communication medium accompanying or referred to in its Response, or used to effect the sale to Purchaser.
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with the Office of the Chief Information Officer (OCIO) Security Policy, Standards and Guidelines, the Use of CTS Network policy attached hereto as Exhibit C, complete annual security awareness training provided by Purchaser’s organization and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) access of any system; 2) any electronic transmission of code or data; 3) prevention of unauthorized access; and 4) not downloading or accessing unapproved systems, programs, code, websites; self-help code, unauthorized code, or other data without the written permission of the Purchaser.
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with the Information Services Board Security Policy, Standards and Guidelines, the Use of DIS Network policy attached hereto as Schedule D, and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, self help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of Purchaser’s network, system or data.
Information and System SecurityNotwithstanding any other provision in the Agreement, Provider, its Provider Agents and Provider Staff represent and warrant to Customer that it will adhere to the data security requirements set forth in the Agreement, including this Article 17 (Confidential Information; Customer Data), any and all Customer Policies, Schedule 9 (Information and System Security Requirements), and Schedule 14 (Data Privacy). Prior to performing any Services, Provider Agents and Provider Staff who may access Customer’s premises, Customer Systems, Customer Resources, and/or Confidential Information of Customer, including Customer Data, will confirm Juniper – IBM, MSA, dated 12-31-2018 MA-IB-00136-2018 in writing (electronically or in any other manner), which confirmation is auditable and sufficient to ensure that each of them is aware of and will comply with the provisions of the Agreement (including Customer Policies) concerning access protection and data/software security. Upon request by Customer, Provider will confirm that each such Person has provided such confirmation. Failure of Provider, Provider Agents or Provider Staff to comply with the provisions of the Agreement will be deemed a breach and may result, among other things, in Customer restricting the offending Provider Staff from access to Customer premises, Customer Systems, Customer Confidential Information and Customer Data, and/or immediate termination of the Agreement. Without limiting the foregoing, if Provider’s failure to comply with its responsibilities under the Information and System Security requirements under this Agreement results in (A) a Security Incident involving the disclosure or improper or unauthorized Processing of Customer Data or destructive acts on Systems or (B) an actual Critical or High-Severity Security Incident, each as defined under Customer’s Incident Response Plan, such non-compliance will be deemed a material breach.
Information and System Security. Contractor acknowledges and understands that access to DIS’ computer networks may be necessary to perform the work under this Contract, and as a result DIS has placed or may place special confidence and trust in the Contractor in providing such access. Contractor acknowledges and understands that any access to DIS’ computer networks shall be limited, restricted and conditioned upon Contractor’s compliance with certain DIS policies and practices. Contractor warrants that it will perform all work for or on behalf of DIS in full compliance with the Information Services Board Security Policy, Standards and Guidelines, the Use of DIS Networks Policy attached hereto as Schedule B, and any other security documents and best practices provided by DIS (“Security Policies”). Contractor, having agreed upon DIS’ Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, Self Help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of DIS’ network, system or data.
Information and System Security 

Related to Information and System Security

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Information and Data ‌ Upon request of the Union, the Employer agrees to furnish the Union with the following information: budgets for the Board of Regents; budgets for each College; public information used in the preparation of budgets as provided by law such as salaries; minutes of meetings of the Board; policies of the Board of Regents which apply to faculty members. Voluminous information shall be made available for inspection or will be provided at reproduction cost.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment. 5.2 If a D&E Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by D&E, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. D&E shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 D&E shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow D&E to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. 5.4 D&E shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from D&E Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, D&E shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow D&E to route information services traffic originated on its network to Verizon.

  • Why We Collect Information and For How Long We are collecting your data for several reasons: · To better understand your needs and provide you with the services you have requested; · To fulfill our legitimate interest in improving our services and products; · To send you promotional emails containing information we think you may like when we have your consent to do so; · To contact you to fill out surveys or participate in other types of market research, when we have your consent to do so; · To customize our website according to your online behavior and personal preferences. The data we collect from you will be stored for no longer than necessary. The length of time we retain said information will be determined based upon the following criteria: the length of time your personal information remains relevant; the length of time it is reasonable to keep records to demonstrate that we have fulfilled our duties and obligations; any limitation periods within which claims might be made; any retention periods prescribed by law or recommended by regulators, professional bodies or associations; the type of contract we have with you, the existence of your consent, and our legitimate interest in keeping such information as stated in this Policy.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Information and Services Required of the Owner The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.04, the parties acknowledge that the Direct Registration System (“DRS”) and Profile Modification System (“Profile”) shall apply to uncertificated American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC pursuant to which the Depositary may register the ownership of uncertificated American Depositary Shares, which ownership shall be evidenced by periodic statements issued by the Depositary to the Owners entitled thereto. Profile is a required feature of DRS which allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register such transfer. (b) In connection with and in accordance with the arrangements and procedures relating to DRS/Profile, the parties understand that the Depositary will not verify, determine or otherwise ascertain that the DTC participant which is claiming to be acting on behalf of an Owner in requesting a registration of transfer and delivery as described in subsection (a) has the actual authority to act on behalf of the Owner (notwithstanding any requirements under the Uniform Commercial Code). For the avoidance of doubt, the provisions of Sections 5.03 and 5.08 shall apply to the matters arising from the use of the DRS. The parties agree that the Depositary’s reliance on and compliance with instructions received by the Depositary through the DRS/Profile System and in accordance with this Deposit Agreement shall not constitute negligence or bad faith on the part of the Depositary.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.