Information and System Security Sample Clauses

Information and System Security. Servicer shall provide the Services in conformance with the respective Servicee’s terms and conditions set forth in Annex C.
AutoNDA by SimpleDocs
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with Washington State’s OCIO’s and CTS’s security policies, as well as any other policy of Washington State that is still in effect, which may include the Information Services Board Security Policy, Standards and Guidelines, and the CTS Site and Security Policy attached hereto as Exhibit C, and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, self-help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of Purchaser’s network, system or data. Vendor Commitments, Warranties and Representations. Any written commitment by Vendor within the scope of this Contract shall be binding upon Vendor. Failure of Vendor to fulfill such a commitment may constitute breach and shall render Vendor liable for damages under the terms of this Contract. For purposes of this section, a commitment by Vendor includes: (i) Prices, discounts, and options committed to remain in force over a specified period of time; and (ii) any warranty or representation made by Vendor in its Response (if any) or contained in any Vendor or manufacturer publications, written materials, schedules, charts, diagrams, tables, descriptions, other written representations, and any other communication medium accompanying or referred to in its Response, or used to effect the sale to Purchaser.
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with the Office of the Chief Information Officer (OCIO) Security Policy, Standards and Guidelines, the Use of CTS Network policy attached hereto as Exhibit C, complete annual security awareness training provided by Purchaser’s organization and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) access of any system; 2) any electronic transmission of code or data; 3) prevention of unauthorized access; and 4) not downloading or accessing unapproved systems, programs, code, websites; self-help code, unauthorized code, or other data without the written permission of the Purchaser.
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with the Information Services Board Security Policy, Standards and Guidelines, the Use of DIS Network policy attached hereto as Schedule D, and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, self help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of Purchaser’s network, system or data.
Information and System Security. Notwithstanding any other provision in the Agreement, Provider, its Provider Agents and Provider Staff represent and warrant to Customer that it will adhere to the data security requirements set forth in the Agreement, including this Article 17 (Confidential Information; Customer Data), any and all Customer Policies, Schedule 9 (Information and System Security Requirements), and Schedule 14 (Data Privacy). Prior to performing any Services, Provider Agents and Provider Staff who may access Customer’s premises, Customer Systems, Customer Resources, and/or Confidential Information of Customer, including Customer Data, will confirm Confidential Juniper – IBM, MSA, dated 12-31-2018 MA-IB-00136-2018 Confidential Treatment Requested by Juniper Networks, Inc. in writing (electronically or in any other manner), which confirmation is auditable and sufficient to ensure that each of them is aware of and will comply with the provisions of the Agreement (including Customer Policies) concerning access protection and data/software security. Upon request by Customer, Provider will confirm that each such Person has provided such confirmation. Failure of Provider, Provider Agents or Provider Staff to comply with the provisions of the Agreement will be deemed a breach and may result, among other things, in Customer restricting the offending Provider Staff from access to Customer premises, Customer Systems, Customer Confidential Information and Customer Data, and/or immediate termination of the Agreement. Without limiting the foregoing, if Provider’s failure to comply with its responsibilities under the Information and System Security requirements under this Agreement results in (A) a Security Incident involving the disclosure or improper or unauthorized Processing of Customer Data or destructive acts on Systems or (B) an actual Critical or High-Severity Security Incident, each as defined under Customer’s Incident Response Plan, such non-compliance will be deemed a material breach.
Information and System Security. Contractor acknowledges and understands that access to DIS’ computer networks may be necessary to perform the work under this Contract, and as a result DIS has placed or may place special confidence and trust in the Contractor in providing such access. Contractor acknowledges and understands that any access to DIS’ computer networks shall be limited, restricted and conditioned upon Contractor’s compliance with certain DIS policies and practices. Contractor warrants that it will perform all work for or on behalf of DIS in full compliance with the Information Services Board Security Policy, Standards and Guidelines, the Use of DIS Networks Policy attached hereto as Schedule B, and any other security documents and best practices provided by DIS (“Security Policies”). Contractor, having agreed upon DIS’ Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, Self Help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of DIS’ network, system or data.
Information and System Security 
AutoNDA by SimpleDocs

Related to Information and System Security

  • Access to Information and Services ..28 Section 7.01. Provision of Corporate Records......................................................28 Section 7.02. Access to Information...............................................................28 Section 7.03.

  • Information Systems The Official Agency in conjunction with the Authority will meet the relevant requirements of Articles 131 to 136 of Regulation (EU) 2017/625 and Implementing Regulation (EU) 2019/1715 as appropriate to the Official Agency. The Official Agency shall record appropriate data in the Official Agency Premises Inspection database (OAPI), which will be further developed over the life of the contract. Data should be entered into the database on an ongoing basis but shall be entered within one month of the activity taking place, unless otherwise agreed with the Authority.

  • INFORMATION AND DATA 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

  • Information Services The Custodian may rely upon information received from issuers of Securities or agents of such issuers, information received from Subcustodians or depositories, information from data reporting services that provide detail on corporate actions and other securities information, and other commercially reasonable industry sources; and, provided the Custodian has acted in accordance with the standard of care set forth in Section 6 (a), the Custodian shall have no liability as a result of relying upon such information sources, including but not limited to errors in any such information.

  • Ownership and Protection of Proprietary Information (i) As used herein, the term “

Time is Money Join Law Insider Premium to draft better contracts faster.