IT and Security Policies Sample Clauses

IT and Security Policies. Service Provider will, and will cause all its Personnel to, make commercially reasonable efforts to comply with all published Sprint information technology, security, facilities and engineering policies applicable to all Sprint service providers providing similar Deliverables and Services, as amended from time to time and provided in writing by Sprint to Service Provider, within 30 days of the date that such policy or amendment is provided to Service Provider, including, without limitation, Sprint Nextel Enterprise Security Policy and the Sprint Nextel Information Security Standards (collectively Security Policies”), each solely to the extent applicable to the Services and Deliverables to be provided under this Fourteenth Amendment. Service Provider will inform all Personnel of their obligation to comply with all the Security Policies. In the event of any violation of any of the Security Policies, whether by Service Provider or any of its Personnel, Service Provider will (i) cure the violation to Sprint’s satisfaction and, at no additional charge to Sprint, as and to the extent directed by Sprint, remediate any impact thereof; (ii) promptly offer to remove or remove from any Sprint facility any Personnel who violate any of the Security Policies and (iii) furnish a suitable replacement, meeting all the requirements hereof, for the removed Personnel within a reasonable time period.
AutoNDA by SimpleDocs
IT and Security Policies. Without limiting the generality of Section 2.6(a), Buyer shall, and shall cause each Buyer Group Member and its and their respective independent contractors to, (a) comply with all aspects of Seller’s privacy, confidentiality and data security policies, as reasonably revised by Seller from time to time, (b) comply with all physical and electronic security requirements and conditions for Seller’s network and computer system access and usage if such usage is deemed necessary by Seller, and (c) comply with any other reasonable information technology procedures applicable to Seller’s network and computer systems.
IT and Security Policies. Company will, and will cause Company Personnel to comply with all published Sprint information technology, security, facilities and engineering policies, as amended from time to time, including, without limitation, the Sprint Vendor/Partner Security and the IT Architecture and Planning Consultant Policy (collectively “IT and Security Policies”) within thirty (30) days of receipt of policy documents from Sprint. If Company or Company Personnel violates any IT and Security Policies, Company will: (i) cure the violation to the satisfaction of Sprint at no additional charge and remediate any impact as directed by Sprint; (ii) immediately remove any Company Personnel who violate any IT and Security Policies from performing Services; and (iii) and will replace removed Company Personnel within 24 hours and in accordance with this Agreement. If Company has not cured the violation within 24 hours or remediated the violation to the satisfaction of Sprint, Sprint may, at its option, and without limiting any other remedy, terminate the affected Order or withhold payment until the violation is cured or remediation is made. Sprint could incur substantial costs for Company’s non-compliance with the IT and Security Policies. Accordingly, Company will reimburse Sprint for any direct costs incurred by Sprint as a result of Company’s non-compliance. Investigations Company will make Company Personnel reasonably available to Sprint for the purpose of Sprint promptly investigating the conduct or performance of Company or Company’s Personnel under or related to this Agreement and must provide information relevant to the investigation as reasonably requested.
IT and Security Policies. Amdocs will, and will cause all its Personnel to comply with the Sprint information technology, security, facilities and engineering policies and requirements as they [**] by Sprint to Amdocs from time to time [**]. Without limiting the foregoing, Amdocs acknowledges that the following policies [**] shall be considered [**] and acknowledges its obligation pursuant to the Agreement to abide by such policies: (a) [**]). Sprint shall provide any modifications and updates in the IT and Security Policies to Amdocs in writing; provided that [**], in which event [**]. Amdocs will become compliant with such modifications and updates in the IT and Security Policies within [**], the specific timeframe as mutually agreed to by the Parties. Sprint will cooperate with Amdocs' compliance efforts and the Parties will negotiate in good faith the period for such compliance efforts if the Parties mutually agree that the scope of the compliance requirements necessitate a longer timeframe for implementation. If implementation of future modifications and updates in the IT and Security Policies requires an Amdocs investment, then such increased costs shall be allocated pursuant to the applicable provisions of Section 2.5 of the Agreement (where Customization hours are involved) and agreed upon Additional Service Orders (for other and additional costs). Amdocs will inform all Personnel of their obligation to comply with all the IT and Security Policies. In the event of any violation of any of the IT and Security Policies, whether by Amdocs or any of its Personnel, Amdocs will (i) cure the violation to Sprint's satisfaction [**], as and to the extent directed by Sprint, remediate any impact thereof; (ii) immediately offer to remove or remove from any service for Sprint any Personnel who commit a material violation of any of the IT and Security Policies and (iii) furnish a suitable replacement, meeting all the requirements hereof, [**]. If Amdocs has not cured the violation within [**], Sprint may, at its option, and without limiting any other remedy hereunder, [**]. Amdocs agrees that Sprint may [**]. Notwithstanding the provisions of Section 6, [**] of this Schedule Y, such Sections of this Schedule Y shall apply; provided that [**], then the Parties shall meet in good faith to determine the manner and timeframe in which Amdocs shall implement such changes in Sprint's IT and Security Policies and consistent with Section 2.5 of the Agreement (if applicable).

Related to IT and Security Policies

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Guarantee and Security Agreement The Guarantee and Security Agreement, duly executed and delivered by each of the parties to the Guarantee and Security Agreement.

  • Data Privacy and Security Laws The Company is, and at all prior times was, in material compliance with all applicable state and federal data privacy and security laws and regulations in the United States, including, without limitation, the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) as amended by the Health Information Technology for Economic and Clinical Health Act, and all applicable provincial and federal data privacy and security laws and regulations in Canada, including without limitation the Personal Information Protection and Electronic Documents Act (S.C. 2000, c. 5) (“PIPEDA”); and the Company has taken commercially reasonable actions to prepare to comply with, and have been and currently are in compliance with, the European Union General Data Protection Regulation (“GDPR”) (EU 2016/679) (collectively, the “Privacy Laws”). To ensure compliance with the Privacy Laws, the Company has in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; (iv) “personal information”, “personal health information”. and “business contact information” as defined by PIPEDA; (v) “personal data” as defined by GDPR; and (vi) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. The Company has at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies: (i) it has not received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Privacy Laws, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Privacy Law; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability under any Privacy Law.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Lien Perfection; Further Assurances Each Borrower shall execute such instruments, assignments or documents as are necessary to perfect Agent's Lien upon any of the Collateral and shall take such other action as may be required to perfect or to continue the perfection of Agent's Lien upon the Collateral. Unless prohibited by applicable law, each Borrower hereby authorizes Agent to execute and file any UCC, PPSA or similar financing statement, including, without limitation, financing statements that indicate the Collateral (i) as all assets of such Borrower or words of similar effect, or (ii) as being of an equal or lesser scope, or with greater or lesser detail, than as set forth in Section 5.1, on such Borrower's behalf. Each Borrower also hereby ratifies its authorization for Agent to have filed in any jurisdiction any like financing statements or amendments thereto if filed prior to the date hereof. The parties agree that a carbon, photographic or other reproduction of this Agreement shall be sufficient as a financing statement and may be filed in any appropriate office in lieu thereof. At Agent's request, each Borrower shall also promptly execute or cause to be executed and shall deliver to Agent any and all documents, instruments and agreements deemed necessary by Agent, to give effect to or carry out the terms or intent of the Loan Documents.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!