Common use of Operations Security Clause in Contracts

Operations Security. 8.1. The Supplier shall: 8.1.1. at its sole discretion, implement readily available software to detect, report and remove or quarantine malicious software /code in systems in accordance with standard industry practice in relation to the Services provided; 8.1.2. ensure there is a process to back-up copies of Customer Data and that the procedure is tested regularly and is in accordance with the Supplier’s own internal retention policies. Back-ups shall be secured through physical protection and the use of encryption; and 8.1.3. ensure that timely information about technical vulnerabilities of Systems used shall be obtained, any exposure to such vulnerabilities evaluated, and effective measures taken to address the associated risk.

Appears in 3 contracts

Samples: Software and Professional Services Agreement, Software and Professional Services Agreement, Software and Professional Services Agreement

AutoNDA by SimpleDocs

Operations Security. 8.1. 8.1 The Supplier shall: 8.1.1. 8.1.1 at its sole discretion, implement readily available software to detect, report and remove or quarantine malicious software /code in systems in accordance with standard industry practice in relation to the Services provided; 8.1.2. 8.1.2 ensure there is a process to back-up copies of Customer Data and that the procedure is tested regularly and is in accordance with the Supplier’s 's own internal retention policies. Back-ups shall be secured through physical protection and the use of encryption; and 8.1.3. 8.1.3 ensure that timely information about technical vulnerabilities of Systems used shall be obtained, any exposure to such vulnerabilities evaluated, and effective measures taken to address the associated risk.

Appears in 1 contract

Samples: Agreement for International Payment Services

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!