OPERATIONAL TECHNOLOGY SYSTEMS Sample Clauses

OPERATIONAL TECHNOLOGY SYSTEMS. OWNER agrees that the effectiveness of operational technology systems and features designed, recommended or assessed by ENGINEER (collectively “OT Systems”) are dependent upon OWNER’s continued operation and maintenance of the OT Systems in accordance with all standards, best practices, laws, and regulations that govern the operation and maintenance of the OT Systems. OWNER shall be solely responsible for operating and maintaining the OT Systems in accordance with applicable laws, regulations, and industry standards (e.g. ISA, NIST, etc.) and best practices, which generally include but are not limited to, cyber security policies and procedures, documentation and training requirements, continuous monitoring of assets for tampering and intrusion, periodic evaluation for asset vulnerabilities, implementation and update of appropriate technical, physical, and operational standards, and offline testing of all software/firmware patches/updates prior to placing updates into production. Additionally, OWNER recognizes and agrees that OT Systems are subject to internal and external breach, compromise, and similar incidents. Security features designed, recommended or assessed by ENGINEER are intended to reduce the likelihood that OT Systems will be compromised by such incidents. However, ENGINEER does not guarantee that OWNER’s OT Systems are impenetrable and OWNER agrees to waive any claims against ENGINEER resulting from any such incidents that relate to or affect OWNER’s OT Systems.
AutoNDA by SimpleDocs
OPERATIONAL TECHNOLOGY SYSTEMS. OWNER agrees that the effectiveness of operational technology systems (“OT Systems”) and features designed, recommended or assessed by ENGINEER are dependent upon OWNER’s continued operation and maintenance of the OT Systems in accordance with all standards, best practices, laws, and regulations that govern the operation and maintenance of the OT Systems. OWNER shall be solely responsible for operating and maintaining the OT System in accordance with applicable industry standards (i.e. ISA, NIST, etc.) and best practices, which generally include but are not limited to, cyber security policies and procedures, documentation and training requirements, continuous monitoring of assets for tampering and intrusion, periodic evaluation for asset vulnerabilities, implementation and update of appropriate technical, physical, and operational standards, and offline testing of all software/firmware patches/updates prior to placing updates into production. Additionally, OWNER recognizes and agrees that OT Systems are subject to internal and external breach, compromise, and similar incidents. Security features designed, recommended or assessed by ENGINEER are intended to reduce the likelihood that OT Systems will be compromised by such incidents.

Related to OPERATIONAL TECHNOLOGY SYSTEMS

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

Time is Money Join Law Insider Premium to draft better contracts faster.