IT Security. Development and implementation of management, operational, and technical security controls required by agencies to assure desired levels of protection for IT systems and data are achieved (e.g., establishment of policy/procedures in support of Federal IT security requirements, conduct risk assessments to identify threats/vulnerabilities for existing/planned systems; support Federal mandates for measuring and reporting compliance, perform certification and accreditation (C&A) activities; provide training services to promote awareness and knowledge of compliance responsibilities for Federal IT security requirements).
IT Security. (a) Contractor has an information security program to maintain physical, technical, administrative, and organizational safeguards that comply with:
(a) applicable industry standards and guidelines; and (b) Washington State Office of Chief Information Officer (OCIO) Policy 141.10 – Securing Information Technology Assets Standards located at Securing Information Technology Assets | OCIO (xx.xxx)..
(b) Contractor will use its best efforts to ensure that no computer viruses, malware, or similar items (collectively, a “Virus”) are introduced into Purchasers’ computing and network environment by the Services, and that, where it transfers a Virus to Purchasers through the Services, it shall reimburse Purchasers for the actual costs incurred by Purchasers to remove or recover from the Virus.
IT Security. Whinstone will install a firewall and implement an IT security policy to prevent unauthorized access physically or remotely, viruses and ransomware. However, the Customer shall have the right to install its own firewall and implement its own security policies in the place of or in addition to Whinstone as mutually agreed to by both parties.
IT Security. (a) Service Recipient shall cause all of its personnel, employees, officers, contractors, consultants or other agents (collectively, the “Recipient Personnel”) having access to the Provider Systems to comply with all documented security guidelines applicable to Service Provider’s and its Subsidiaries’ personnel, employees, officers, contractors, consultants or other agents generally (including physical security, network access, data security and privacy guidelines and similar policies) of Service Provider and shall not knowingly tamper with, compromise or circumvent any security or audit measures employed by Service Provider. Service Recipient shall ensure that such access shall be made by such Recipient Personnel only as required in connection with, or as specifically contemplated by the performance, delivery or receipt of a Service hereunder.
(b) Service Provider shall cause all of its personnel, employees, officers, contractors, consultants or other agents (collectively, the “Provider Personnel”) having access to (i) Service Recipient’s intranet and other owned, licensed or leased information technology related resources, including software, networks, hardware, servers or other related technology, and (ii) computer-based resources (including e-mail and access to Service Recipient’s computer networks and databases) which require a password or are available on a secured access basis (collectively, the “Recipient Systems”) to comply with all documented security guidelines applicable to Service Recipient’s and its Subsidiaries’ personnel, employees, officers, contractors, consultants or other agents generally (including physical security, network access, data security and privacy guidelines and similar policies) of Service Recipient and shall not knowingly tamper with, compromise or circumvent any security or audit measures employed by Service Recipient. Service Provider shall ensure that such access shall be made by such Provider Personnel only as required in connection with, or as specifically contemplated by, the performance, delivery or receipt of a Service hereunder.
(c) In the event of a cyber incident or attack for which Service Provider reasonably believes the Provider Systems have been or could be compromised, Service Recipient agrees that Service Provider may take all steps it deems reasonably necessary and/or advisable in its sole discretion to remediate such cyber incident, including temporary termination of or blocking Service Recipient’s and R...
IT Security. 15.1. PLATIT equipment can be connected to the internet for the purpose of remote diagnostics and data analysis. It is recommended to connect the equipment only during the time of remote diagnostics to the internet. The customer is responsible for protecting the operating system of the PLATIT equipment and the network through which the PLATIT equipment is connected to the internet against cyber-attacks (e.g., malicious software, hacks, encryptions, data loss). PLATIT excludes liability for damages and consequential damages in connection with cyber-attacks. In addition to online accessibility, PLATIT equipment provides ports to load data onto the units (e.g., USB-stick). It is the customer's duty to ensure that data transferred via such media is free of malicious software and compatible with the operating system and PLATIT software installed on the PLATIT system.
IT Security. 16.1 The Manager shall maintain appropriate IT security in line with industry standards and if necessary comply with any Company IT Security Policy, the details of which shall be made available to the Manager including any revisions or updates.
16.2 The Company (or AUL on its behalf) and the Manager respectively shall advise the other as soon as it becomes aware of any breach, or potential breach, of the IT Security Policy or any other breach, or potential breach, of security which may adversely affect the Services.
16.3 The Manager shall comply with, and shall procure that any sub-contractors comply with, any relevant IT Security Policy.
IT Security. Note: IT Security Confidentiality
IT Security. The Data Recipient shall comply with all laws and regulations applicable to the privacy or security of the Covered Data.
IT Security. The goal of our IT security practices is to make employees more productive and effective to respond to security incidents through internal tools and processes. We have also established clear channels for communications and escalation levels. Our information security policy is documented on our knowledge sharing portal. We have an Epic Data Classification standard that describes the different types of data that our employees work with and how that data should be handled.