Protection of Proprietary Rights. Contractor will reproduce and attach the State’s copyright, product identifications and other proprietary notices on the copies Contractor makes and delivers of the Software, the Source Code and other Deliverables for Procuring Agency, in whole or in part, or on any electronic, hard copy or other tangible form of the Deliverables. Protection of Data. Contractor will protect and safekeep all of Procuring Agency’s Data to the same or a higher degree of care that Contractor takes with respect to its own information and data. Contractor will implement all measures necessary to protect Procuring Agency’s Data from any and all harm, including but not limited to, breach, intrusion, contamination, corruption, loss, leak, theft, disintegration, viral attack, denial-of-service, malware, worms, trojans, ransomware, hacking, phishing, skimming and other damage of any kind (collectively “Data Damage”), whether caused by Contractor, Contractor’s Employees or one or more third parties. In the event a Data Damage incident occurs while Procuring Agency’s Data is within Contractor’s purview and/or control, within one (1) hour of Contractor’s discovery of a Data Damage incident, Contractor will notify the Project Manager concerning the Data Damage incident, including sufficient information for the Project Manager to determine, in conjunction with Contractor, which measures, if any, Contractor must implement to mitigate the Data Damage.
Appears in 6 contracts
Samples: Information Technology Agreement, Information Technology Agreement, Information Technology Agreement
Protection of Proprietary Rights. Contractor will reproduce and attach the State’s copyright, product identifications and other proprietary notices on the copies Contractor makes and delivers of the Software, the Source Code Code, and other Deliverables for Procuring Agency, in whole or in part, or on any electronic, hard copy or other tangible form of the Deliverables. Protection of Data. Contractor will protect and safekeep all of Procuring Agency’s Data to the same or a higher degree of care that Contractor takes with respect to its own information and data. Contractor will implement all measures necessary to protect Procuring Agency’s Data from any and all harm, including but not limited to, breach, intrusion, contamination, corruption, loss, leak, theft, disintegration, viral attack, denial-of-service, malware, worms, trojans, ransomware, hacking, phishing, skimming and other damage of any kind (collectively “Data Damage”), whether caused by Contractor, Contractor’s Employees or one or more third parties. In the event a Data Damage incident occurs while Procuring Agency’s Data is within Contractor’s purview and/or control, within one (1) hour of Contractor’s discovery of a Data Damage incident, Contractor will notify the Project Manager concerning the Data Damage incident, including sufficient information for the Project Manager to determine, in conjunction with Contractor, which measures, if any, Contractor must implement to mitigate the Data Damage.
Appears in 2 contracts
Samples: Information Technology Agreement, Information Technology Agreement