Information and System Security Clause Samples

Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with the Office of the Chief Information Officer (OCIO) Security Policy, Standards and Guidelines, the Use of CTS Network policy attached hereto as Exhibit C, complete annual security awareness training provided by Purchaser’s organization and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) access of any system; 2) any electronic transmission of code or data; 3) prevention of unauthorized access; and 4) not downloading or accessing unapproved systems, programs, code, websites; self-help code, unauthorized code, or other data without the written permission of the Purchaser.
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with the Information Services Board Security Policy, Standards and Guidelines, the Use of DIS Network policy attached hereto as Schedule D, and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, self help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of Purchaser’s network, system or data.
Information and System Security. Vendor acknowledges and understands that access to Purchaser’s computer networks may be necessary to perform the work under this Contract, and as a result Purchaser has placed or may place special confidence and trust in the Vendor in providing such access. Vendor acknowledges and understands that any access to Purchaser’s computer networks shall be limited, restricted and conditioned upon Vendor’s compliance with certain Purchaser policies and practices. Vendor warrants that it will perform all work for or on behalf of Purchaser in full compliance with Washington State’s OCIO’s and CTS’s security policies, as well as any other policy of Washington State that is still in effect, which may include the Information Services Board Security Policy, Standards and Guidelines, and the CTS Site and Security Policy attached hereto as Exhibit C, and any other security documents and best practices provided by Purchaser (“Security Policies”). Vendor, having agreed upon Purchaser’s Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, self-help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of Purchaser’s network, system or data. Any written commitment by Vendor within the scope of this Contract shall be binding upon Vendor. Failure of Vendor to fulfill such a commitment may constitute breach and shall render Vendor liable for damages under the terms of this Contract. For purposes of this section, a commitment by Vendor includes: (i) Prices, discounts, and options committed to remain in force over a specified period of time; and (ii) any warranty or representation made by Vendor in its Response (if any) or contained in any Vendor or manufacturer publications, written materials, schedules, charts, diagrams, tables, descriptions, other written representations, and any other communication medium accompanying or referred to in its Response, or used to effect the sale to Purchaser.
Information and System Security. Servicer shall provide the Services in conformance with the respective Servicee’s terms and conditions set forth in Annex C.
Information and System Security. Notwithstanding any other provision in the Agreement, Provider, its Provider Agents and Provider Staff represent and warrant to Customer that it will adhere to the data security requirements set forth in the Agreement, including this Article 17 (Confidential Information; Customer Data), any and all Customer Policies, Schedule 9 (Information and System Security Requirements), and Schedule 14 (Data Privacy). Prior to performing any Services, Provider Agents and Provider Staff who may access Customer’s premises, Customer Systems, Customer Resources, and/or Confidential Information of Customer, including Customer Data, will confirm Juniper – IBM, MSA, dated 12-31-2018 MA-IB-00136-2018 in writing (electronically or in any other manner), which confirmation is auditable and sufficient to ensure that each of them is aware of and will comply with the provisions of the Agreement (including Customer Policies) concerning access protection and data/software security. Upon request by Customer, Provider will confirm that each such Person has provided such confirmation. Failure of Provider, Provider Agents or Provider Staff to comply with the provisions of the Agreement will be deemed a breach and may result, among other things, in Customer restricting the offending Provider Staff from access to Customer premises, Customer Systems, Customer Confidential Information and Customer Data, and/or immediate termination of the Agreement. Without limiting the foregoing, if Provider’s failure to comply with its responsibilities under the Information and System Security requirements under this Agreement results in (A) a Security Incident involving the disclosure or improper or unauthorized Processing of Customer Data or destructive acts on Systems or (B) an actual Critical or High-Severity Security Incident, each as defined under Customer’s Incident Response Plan, such non-compliance will be deemed a material breach.
Information and System Security. Contractor acknowledges and understands that access to DIS’ computer networks may be necessary to perform the work under this Contract, and as a result DIS has placed or may place special confidence and trust in the Contractor in providing such access. Contractor acknowledges and understands that any access to DIS’ computer networks shall be limited, restricted and conditioned upon Contractor’s compliance with certain DIS policies and practices. Contractor warrants that it will perform all work for or on behalf of DIS in full compliance with the Information Services Board Security Policy, Standards and Guidelines, the Use of DIS Networks Policy attached hereto as Schedule B, and any other security documents and best practices provided by DIS (“Security Policies”). Contractor, having agreed upon DIS’ Security Policies as the acceptable standard for network security, warrants that it shall exercise its best efforts in the execution of the Security Policies with respect to 1) any electronic transfer of code or data; 2) prevention of unauthorized access; and 3) prevention of any and all undisclosed programs, extraneous code, Self Help code, unauthorized code, or other data that may be reasonably expected to damage data, code, software, systems or operations of DIS’ network, system or data.
Information and System Security