Common use of Security and Business Continuity Management Policy Clause in Contracts

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify and require Seller’s management and employees to take appropriate measures necessary to do the following; (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact Buyer’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct dial from outside U.S. […***…]) no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. Buyer may give Seller notice of such determination. Upon receiving such notice. Seller shall have […***…] thereafter to make such policy changes and take the implementation actions reasonably requested by Buyer. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 4 contracts

Samples: Supply Agreement (Tpi Composites, Inc), Supply Agreement, Supply Agreement (Tpi Composites, Inc)

AutoNDA by SimpleDocs

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property properly and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to lo Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact Buyer’s sourcing representative or the GE emergency hotline (U.S. toll-free +[…***…]] /direct dial from outside U.S. +[…***…]) no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. , Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property properly and/or interests. , Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] thereafter to make such policy changes and take the implementation actions reasonably requested by Buyer. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 3 contracts

Samples: Supply Agreement (Tpi Composites, Inc), Supply Agreement (Tpi Composites, Inc), Supply Agreement (Tpi Composites, Inc)

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller;: (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage;: (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; : and (f) ensure the physical integrity and security of or all shipments against the unauthorized introduction of or harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact Buyer’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct ] direct dial from outside U.S. […***…]) ] no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of or Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] thereafter to make such policy changes and take the implementation actions reasonably requested by Buyer. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 3 contracts

Samples: Supply Agreement, Supply Agreement (Tpi Composites, Inc), Supply Agreement (Tpi Composites, Inc)

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact BuyerXxxxx’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct +0 000-000-0000/direct dial from outside U.S. […***…]+0 000-000-0000) no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. , Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] forty-five (45) days thereafter to make such policy changes and take the implementation actions reasonably requested by BuyerXxxxx. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 3 contracts

Samples: Terms of Purchase, Terms of Purchase, Terms of Purchase

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact Buyer’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct ] direct dial from outside U.S. […***…]) ] no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. , Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] thereafter to make such policy changes and take the implementation actions reasonably requested by Buyer. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 3 contracts

Samples: Supply Agreement (Tpi Composites, Inc), Supply Agreement (Tpi Composites, Inc), Supply Agreement (Tpi Composites, Inc)

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact BuyerXxxxx’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct +0-000-000-0000/direct dial from outside U.S. […***…]+0-000-000-0000) no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. , Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] forty-five (45) days thereafter to make such policy changes and take the implementation actions reasonably requested by BuyerXxxxx. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 3 contracts

Samples: Terms of Purchase, Terms of Purchase, Terms of Purchase

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact BuyerXxxxx’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct +0 000 000 0000/direct dial from outside U.S. […***…]+0 000 000 0000) no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. , Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] forty-five (45) days thereafter to make such policy changes and take the implementation actions reasonably requested by BuyerXxxxx. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 3 contracts

Samples: Terms of Purchase, Terms of Purchase, Terms of Purchase

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact BuyerXxxxx’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct dial from outside U.S. […***…]) no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. , Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] forty-five (45) days thereafter to make such policy changes and take the implementation actions reasonably requested by BuyerXxxxx. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 2 contracts

Samples: Terms of Purchase, Terms of Purchase

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact Buyer’s sourcing representative or the GE emergency hotline (U.S. toll-toll free + [...***...]/direct dial from outside U.S. + [...***...]) no later than twenty-four (24) hours [...***...] after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-on site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have [...***...] thereafter to make such policy changes and take the implementation actions reasonably requested by Buyer. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 2 contracts

Samples: Supply Agreement (Tpi Composites, Inc), Supply Agreement (Tpi Composites, Inc)

AutoNDA by SimpleDocs

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, this Order for Buyer or and/or its Affiliates (“Work”) ), including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information of Buyer, its Affiliates, and/or its or their relevant customers as well as Seller, related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and; (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact BuyerXxxxx’s sourcing representative or the GE emergency hotline (U.S. toll+0 000-free […***…]/direct dial from outside U.S. […***…]000-0000) no later than twenty-four (24) 24 hours after inception of the incident. At a minimum, the following details must shall be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s policy implementation is/are insufficient to protect Buyer’s property and/or and interests. , Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] thereafter 45 calendar days thereafter, or such longer period authorized by Xxxxx, to make such policy changes and take the implementation actions reasonably requested by BuyerXxxxx. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 1 contract

Samples: Standard Terms of Purchase

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and a nd employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact BuyerXxxxx’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct dial from outside U.S. […***…]) no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Busines s Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. inter ests, Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] forty-five (45) days thereafter to make such policy changes and take the implementation actions reasonably requested by BuyerXxxxx. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 1 contract

Samples: Standard Terms of Purchase

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller; (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and (f) ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact BuyerXxxxx’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct +0 000-000-0000/direct dial from outside U.S. […***…]+0 000-000-0000) no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. , Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] forty-five (45) days thereafter to make such policy changes and take the implementation actions reasonably requested by BuyerXxxxx. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 1 contract

Samples: Purchase Agreement

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide Provide for the physical security of the people working on Seller’s premises and others working for or on behalf of SellerXxxxxx; (b) provide Provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect Protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (e) provide Provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; and; (f) ensure Ensure the physical integrity and security of all shipments against the unauthorized introduction of harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report Report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact BuyerXxxxx’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct +0 000-000-0000/direct dial from outside U.S. […***…]+0 000-000-0000) no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. , Buyer may give Seller notice of such determination. Upon receiving such notice. , Seller shall have […***…] forty-five (45) days thereafter to make such policy changes and take the implementation actions reasonably requested by BuyerXxxxx. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.

Appears in 1 contract

Samples: General Terms of Purchase

Security and Business Continuity Management Policy. Seller shall have and comply with a company security and business continuity management policy, which shall be revised and maintained proactively and as may be requested by Buyer (“Security and Business Continuity Management Policy”). The Security and Business Continuity Management Policy shall Identify and require Seller’s management and employees to take appropriate measures necessary to do the following;: (a) provide for the physical security of the people working on Seller’s premises and others working for or on behalf of Seller;: (b) provide for the physical security of Seller’s facilities and physical assets related to the performance of work, for Buyer or its Affiliates (“Work”) including, in particular, the protection of Seller’s mission critical equipment and assets; (c) protect software related to the performance of the Work from loss, misappropriation, corruption and/or other damage; (d) protect Buyer and/or its Affiliates’ and Seller’s drawings, technical data and other proprietary information related to the performance of the Work from loss, misappropriation, corruption and/or other damage;: (e) provide for the prompt recovery, including through preparation, adoption and maintenance of a crisis management and disaster recovery plan, of facilities, physical assets, software, drawings, technical data, other intellectual property and/or the Seller’s business operations in the event of a security breach, incident, crisis or other disruption in Seller’s ability to use the necessary facilities, physical assets, software, drawings, technical data or other intellectual property and/or to continue its operations; : and (f) ensure the physical integrity and security of or all shipments against the unauthorized introduction of or harmful or dangerous materials (such measures may include, but are not limited, physical security of manufacturing, packing and shipping areas; restrictions on access of unauthorized personnel to such areas; personnel screening; and maintenance of procedures to protect the integrity of shipments); and (g) report to Buyer all crises and/or supply chain security breaches and/or situations where illegal or suspicious activities relating to the Work are detected. In the event of such crisis, supply chain security breach and/or the detection of illegal or suspicious activity related to the Work, Seller shall contact Buyer’s sourcing representative or the GE emergency hotline (U.S. toll-free […***…]/direct ] direct dial from outside U.S. […***…]) ] no later than twenty-four (24) hours after inception of the incident. At a minimum, the following details must be provided: (i) date and time of the incident; (ii) site/location of the incident, ; and (iii) incident description. Buyer reserves the right to receive and review a physical or electronic copy of Seller’s Security and Business Continuity Management Policy and to conduct on-site audits of or Seller’s facility and practices to determine whether such policy and Seller’s implementation of such policy are reasonably sufficient to protect Buyer’s property and/or interests. If Buyer reasonably determines that Seller’s Security and Business Continuity Management Policy and/or such policy’s implementation is/are insufficient to protect Buyer’s property and/or interests. Buyer may give Seller notice of such determination. Upon receiving such notice. Seller shall have […***…] thereafter to make such policy changes and take the implementation actions reasonably requested by Buyer. Seller’s failure to take such actions shall give Buyer the right to terminate this Order immediately without further compensation to Seller.and/or

Appears in 1 contract

Samples: Supply Agreement (Tpi Composites, Inc)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!