Security Acknowledgement Sample Clauses

Security Acknowledgement. The prospective Contract will include security provisions addressing the following: A. Designating a primary point of contact that the Contractor will coordinate with relative to information security issues that may arise in any resulting Contract; B. Prohibiting the exposure of any Customer data without prior approval from the Customer’s primary contact; C. Prohibiting the access of any Customer data without the prior approval from the Customer’s primary contact; D. Granting the Customer the ability to conduct or use a third party to conduct security assessments to verify compliance with security requirements; E. Stating that ownership of Customer data will remain with the Customer; F. Stating that the Respondent will not use or redistribute any Customer information processed, stored, or transmitted by the Contractor except as specified in the Contract; G. Stating that at no time will Customer data be processed on or transferred to any portable or laptop computing device or any portable storage medium by the Contractor unless that device or storage medium is in use as part of the Contractor’s designated backup and recovery processes; H. Stating that at Contract termination, all Customer data will be returned to the Customer in a usable format to be agreed upon by the Customer and the Contractor; and I. Stating that at Contract termination, after all termination requirements have been met, the Contractor shall erase, destroy, and render unrecoverable all Customer data and certify in writing that these actions have been completed within specified Contract timeframes and that destruction will be performed according to National Institute of Standards and Technology, Special Publication 800-88, “Guidelines for Media Sanitization” (2006). See xxxx://xxxx.xxxx.xxx/. J. Section 7 (Security Acknowledgement) survives the termination of this contract.
AutoNDA by SimpleDocs
Security Acknowledgement. Due to the continual development of new techniques for intruding upon and attacking networks, systems, and/or Computers, Trend Micro does not represent, warrant or guarantee: (1) that Products will detect, block, or completely remove, or clean any or all applications, routines, and files that are malicious, fraudulent or that Company does not use or want; or (2) that any Product or any data, equipment, system or network on which a Product is used (or protects) will be free of vulnerability to intrusion or attack. Company agrees that the success of security efforts and the operation and protection of its Computers, networks, and data are dependent on factors solely under Company’s control and responsibility, including, but not limited to: (a) the design, implementation, deployment, and use of hardware and software security tools in a coordinated effort to manage security threats; (b) the selection, implementation, and enforcement of appropriate internal security policies, procedures and controls regarding access, security, encryption, use, and transmission of data; (c) development of, and ongoing enforcement of, processes and procedures for the backup and recovery of any system, software, database, and any stored data; and (d) diligently and promptly downloading and installing all Updates to Products made available to Company.
Security Acknowledgement. Except for locks on doors and windows and an alarm system, Landlord does not provide any type of security protection in, on, or about the Building. Tenant acknowledges that Tenant will be instructed on how to operate and test the alarm system via email provided by Tenant. Tenant also acknowledges and understands that this alarm system, like all alarm systems, may malfunction or be rendered inoperable. Tenant agrees to periodically test the alarm system and acknowledges that it is Tenant’s responsibility to immediately report any malfunction in writing to Landlord. Landlord shall not be liable to Tenant for any malfunction or inoperability of the alarm system, or any failure of the alarm system, unless caused by Landlord’s fault, omission, negligence, or other misconduct. Tenant understands and acknowledges that the alarm system will only be monitored by Network Multi-Family Security Corporation if Tenant, and all other tenants in the apartment, execute a Tenant Contract for Monitored Alarm Services with Network Multi-Family Security Corporation, a copy of which Landlord has available for Tenant to review and execute. Tenant acknowledges that property and premises are under surveillance at all times and are not monitored.
Security Acknowledgement. 4.1 The Software provided by Dash Solutions is meant to be used as a tool for viewing regulatory issues. It is the Customer's responsibility to confirm proper compliance with regulatory requirements for HIPAA, HITECH and any other regulatory standards applicable to Customer. This means the Customer is responsible for administrative tasks and other responsibilities dictated by vendor agreements. 4.2 Use of the Software provided by Dash Solutions does not warrant or guarantee compliance with HIPAA/HITECH or similar security frameworks. Furthermore, Dash Solutions does not provide any warranties, certifications or guarantees of Customer compliance with HIPAA/HITECH or similar security frameworks.
Security Acknowledgement. Trend Micro does not warrant or guarantee that Products will detect, block, or completely remove or clean any or all applications, routines, and files that are malicious, fraudulent, or that Company does not use or want. Company agrees that the success of security efforts and the operation and protection of its Computers, networks, and data are dependent on factors solely under Company’s control and responsibility, including, but not limited to: (a) the design, implementation, deployment, and use of hardware and software security tools in a coordinated effort to manage security threats; (b) the selection, implementation, and enforcement of appropriate internal security policies, procedures and controls regarding access, security, encryption, use, and transmission of data; (c) development of, and ongoing enforcement of, processes and procedures for the backup and recovery of any system, software, database, and any stored data; and (d) diligently and promptly downloading and installing all Updates to Products made available to Company.
Security Acknowledgement. Content Security Updates, service databases, heuristics and definitions are designed to identify, block and/or remove applications, messages and files that may compromise productivity or the performance and security of MSP Reseller and/or MSP’s End Customers’ networks. While Trend Micro uses reasonable efforts to properly identify applications and files for detection, given the nature and volume of malicious and unwanted electronic content, Trend Micro cannot guarantee that Trend Micro Products will properly detect or clean applications and files that are malicious or that MSP Reseller and/or its MSP’s End Customers does not use or want. MSP Reseller acknowledges, accepts, represents that MSP Reseller and the applicable MSP’s End Customers acknowledges, and accepts the risk that the Trend Micro Products may cause welcome as well as unwelcome files, email or URLs or other web content to be screened and blocked and that rejected files may not be recoverable. To improve its products, Trend Micro may also upload information periodically from installed Trend Micro Software about product usage, detected malware, or potentially unwanted files and use service traffic to improve its data bases and heuristics. Trend Micro reserves the title, ownership and all rights and interest to any intellectual property or work product resulting from its use and analysis of such information. MSP Reseller understands and agrees that the success of MSP Reseller’s security efforts are dependent on a number of factors solely under MSP Reseller’s control and responsibility including: (a) the design, implementation and use of a number of hardware and software security tools in a coordinated effort to manage present and future security threats; (b) the selection, implementation, and enforcement of appropriate internal security policies, procedures and controls regarding access, security, encryption, use, and transmission of data (including any personally identifiable information/data); (c) the backup and recovery of any system, database and any stored data; and (d) diligently and promptly downloading and installing all Updates purchased by and available to MSP Reseller.
Security Acknowledgement. The Software provided by Dash Solutions is intended to be used as a tool for viewing potential security issues. It is the Customer's responsibility to confirm proper compliance with all applicable security and regulatory standards such as (and including) HIPAA/HITECH, SOC 2, NIST, and ISO 27001. The Customer is responsible for all administrative, technical, and physical safeguards requirements dictated for security and regulatory standards. Use of Software provided by Dash Solutions does not warrant or guarantee compliance with HIPAA/HITECH, SOC 2, NIST, ISO 27001 or any similar security frameworks. Furthermore, Dash Solutions does not provide any warranties, certifications or guarantees of Customer compliance with HIPAA/HITECH, SOC 2, NIST, ISO 27001 or similar security frameworks.
AutoNDA by SimpleDocs
Security Acknowledgement. Certain Cloudnosys products are designed to identify, block and/or remove applications, messages, and files that may compromise productivity or the performance and security of computers, systems, and/or networks. While Cloudnosys uses commercially reasonable efforts to properly identify applications and files for detection by its products/software, however, given the constantly changing nature and volume of malicious, fraudulent, and unwanted electronic content, Cloudnosys cannot and does not warrant or guarantee that SCC will detect, block, or completely remove or clean any or all applications, routines, and files that are malicious, fraudulent, or that Company does not use or want. Company understands and agrees that the success of its security efforts are dependent on a number of factors solely under Company's control and responsibility such as: (a) the design, implementation, and use of a number of hardware and software security tools in a coordinated effort to manage present and future security threats; (b) the design, development and implementation of cybersecurity protocols and controls, network and systems protections, as well as monitoring and detection processes applicable to the foregoing; (c) the selection, implementation, and enforcement of appropriate internal security policies, procedures, and controls regarding access, security, encryption, use, and transmission of data; (d) the development of processes and procedures for backup and recovery of any system, software, database, and any stored data; (e) conducting regular cybersecurity and privacy training for employees; (f) having adequate vendor risk management processes; and (g) diligently and promptly downloading and installing all updates to all products and software that are made available to Company by any publisher or manufacturer.
Security Acknowledgement. Trend Micro does not warrant or guarantee that Products will detect, block, or completely remove or clean any or all applications, routines, and files that are malicious, fraudulent, or that Ordering Activity does not use or want. Ordering Activity agrees that the success of security efforts and the operation and protection of its Computers, networks, and data are dependent on factors solely under Ordering Activity’s control and responsibility, including, but not limited to: (a) the design, implementation, deployment, and use of hardware and software security tools in a coordinated effort to manage security threats; (b) the selection, implementation, and enforcement of appropriate internal security policies, procedures and controls regarding access, security, encryption, use, and transmission of data; (c) development of, and ongoing enforcement of, processes and procedures for the backup and recovery of any system, software, database, and any stored data; and (d) diligently and promptly downloading and installing all Updates to Products made available to Ordering Activity.
Security Acknowledgement. The prospective Contract will include security provisions addressing the following: A. Designating a primary point of contact that the Contractor will coordinate with relative to information security issues that may arise in any resulting Contract; B. Prohibiting the exposure of any Customer data without prior approval from the Customer’s primary contact; C. Prohibiting the access of any Customer data without the prior approval from the Customer’s primary contact; D. Granting the Customer the ability to conduct or use a third party to conduct security assessments to verify compliance with security requirements; E. Stating that ownership of Customer data will remain with the Customer;
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!