Security and Policies Sample Clauses

Security and Policies. All performance under this Contract, shall be in accordance with the County’s security requirements, policies, and procedures as set forth above and as modified, supplemented, or replaced by the County from time to time, in its sole discretion, by providing Contractor with a written copy of such revised requirements, policies, or procedures reasonably in advance of the date that they are to be implemented and effective (collectively, the “Security Policies”). Contractor shall at all times use industry best practices and methods with regard to the prevention, detection, and elimination, by all appropriate means, of fraud, abuse, and other inappropriate or unauthorized access to County systems accessed in the performance of services in this Contract.
AutoNDA by SimpleDocs
Security and Policies. All performance under this Contract shall be in accordance with County’s security requirements, policies, and procedures as set forth above and as modified, supplemented, or replaced by County from time to time, in its sole discretion, by providing Contractor with a written copy of such revised requirements, policies, or procedures reasonably in advance of the date that they are to be implemented and effective (collectively, the “Security Policies”). Contractor shall at all times use industry best practices and methods, and all applicable HIPAA privacy and security regulations with regard to the prevention, detection, and elimination, by all appropriate means, of fraud, abuse, and other inappropriate or unauthorized access to County systems accessed in the performance of services in this Contract. Information Access County may require all Contractor personnel performing services under this Contract to execute a confidentiality and non-disclosure agreement and concerning access protection and data security in the form provided by County. County shall authorize, and Contractor shall issue, any necessary information-access mechanisms, including access IDs and passwords, and Contractor shall take all commercially reasonable measures that comply with HIPAA security and privacy regulations to secure such mechanisms. Contractor shall provide each Contractor personnel with only such level of access as is required for such individual to perform his or her assigned tasks and functions. All County systems, and all data and software contained therein, including County data, County hardware and County software, used or accessed by Contractor: (a) shall be used and accessed by such Contractor solely and exclusively in the performance of their assigned duties in connection with, and in furtherance of, the performance of Contractor’s obligations hereunder; and (b) shall not be used or accessed except as expressly permitted hereunder, or commercially exploited in any manner whatsoever, by Contractor, at any time. Enhanced Security Procedures County may, in its discretion, designate certain areas, facilities, or systems as requiring a higher level of security and access control. County shall notify Contractor in writing reasonably in advance of any such designation becoming effective. Any such notice shall set forth in reasonable detail the enhanced security or access-control procedures, measures, or requirements that Contractor shall be required to implement and enforce, a...
Security and Policies. All performance under this Contract shall be in accordance with County’s security requirements, policies, and procedures as set forth in this Paragraph. Contractor shall at all times use industry best practices and methods with regard to the prevention, detection, and elimination, by all appropriate means, of fraud, abuse, and other inappropriate or unauthorized access to County Resources (which is defined as all applicable County systems, software, assets, hardware, equipment, and other resources owned by or leased or licensed to County or that are provided to County by third party service providers) and County Data accessed in the performance of Services in this Contract. Contractor also must comply with Attachment D, Business Associate Contract. Information Access Contractor must at all times use appropriate safeguard and security measures to ensure the confidentiality and security of all County Data and County Resources. All County Data and County Resources used and/or accessed by Contractor: (a) must be used and accessed by Contractor solely and exclusively in connection with, and in furtherance of, the performance of Contractor’s obligations under this Contract; (b) must not be used or accessed except as expressly permitted in this Contract and must not be commercially exploited in any manner whatsoever by Contractor or Contractor’s personnel and subcontractors; and (c) must not be shared with Contractor’s parent company or other affiliate without County’s express prior written consent. County may require Contractor to issue any necessary information-access mechanisms, including access IDs and passwords, to Contractor personnel and subcontractors, only with such level of access as is required for the individual to perform the individual’s assigned tasks and functions under this Contract. The issued mechanisms may not be shared and may only be used by the individual to whom the information-access mechanism is issued. In addition, the issued mechanisms must be promptly cancelled when the individual is terminated, transferred or on a leave of absence. Each calendar year of the Contract and any time upon request by County, Contractor must provide County with an accurate, up-to-date list of those Contractor personnel and subcontractors with access to County Data and/or County Resources and the respective security level or clearance assigned to each such individual. Contractor, including Contractor personnel and subcontractors, must fully comply with all o...
Security and Policies. In addition to any other requirements in the Contract, at all times during the Term, Contractor shall provide all Services, use all resources related thereto, and use, operate, support, and maintain any Systems, in an appropriately secure manner and in accordance with the State’s security requirements, policies, and procedures as communicated, modified, supplemented, or replaced by the State from time to time, in its sole discretion, by providing Contractor with a written copy of such revised requirements, policies, or procedures reasonably in advance of the date that they are to be implemented and effective (“Security Policies”). Contractor shall at all times take all reasonably necessary and appropriate action with regard to the prevention, detection, and elimination, by all appropriate means, of fraud, abuse, and other inappropriate or unauthorized access to and use of Systems and the networks involved with the provision or receipt of Services, including the implementation and deployment network management and maintenance applications and tools, the use of appropriate encryption technologies, and other security- related Services. In addition, all Contractor personnel (including personnel of any subcontractors) shall be subject to, and shall at all times conform to, all of the State’s policies, procedures, rules, and requirements regarding the protection of premises, materials, equipment, and personnel, as the State shall provide (in writing or electronically) in advance to Contractor. Contractor shall, and shall cause Contractor personnel and subcontractors to, fully comply with and abide by all such Security Policies provided in advance to Contractor at all times during the Term. Any violation or disregard of such Security Policies by an individual shall be cause for denial of access of such individual to the State’s property. Contractor shall exercise due care and diligence to prevent any injury to person or damage to property while on the State’s premises. The operation of Contractor vehicles or private vehicles of Contractor personnel on the State’s property shall conform to posted and other regulations and safe driving practices. Vehicular accidents on the State’s property and involving Contractor personnel shall be reported promptly to the appropriate State personnel. Contractor shall, and shall cause Contractor personnel and subcontractors, to not exceed (or attempt to exceed) the level of authorized access, if any, to any networks, computer or e...
Security and Policies. 16.1 The Service Provider acknowledges and agrees that it must meet and maintain any requisite government security screening requirements as may be determined as necessary by the County from time to time. The Service Provider further agrees that it will cause its employees and agents, including the Representative, to take all necessary steps to meet such requirements. These requirements may include, but are not limited to, verification of personal data, education/professional qualifications, employment history and other similar checks.
Security and Policies. All performance under this Contract shall be in accordance with County’s security requirements, policies, and procedures as set forth above and as modified, supplemented, or replaced by County from time to time, in its sole discretion, by providing Contractor with a written copy of such revised requirements, policies, or procedures reasonably in advance of the date that they are to be implemented and effective (collectively, the “Security Policies”). Contractor shall at all times use industry best practices and methods, and all applicable HIPAA privacy and security regulations with regard to the prevention, detection, and elimination, by all appropriate means, of fraud, abuse, and other inappropriate or unauthorized access to County systems accessed in the performance of services in this Contract. Information Access Contractor personnel performing services under this Contract will execute a confidentiality and non-disclosure agreement provided by Contractor. County shall authorize, and Contractor shall issue, any necessary information-access mechanisms, including access IDs and passwords, and Contractor shall take all commercially reasonable measures that comply with HIPAA security and privacy regulations to secure such mechanisms. Contractor shall provide each Contractor personnel with only such level of access as is required for such individual to perform his or her assigned tasks and functions. All County systems, and all data and software contained therein, including County data, County hardware and County software, used or accessed by Contractor: (a) shall be used and accessed by such Contractor solely and exclusively in the performance of their assigned duties in connection with, and in furtherance of, the performance of Contractor’s obligations hereunder; and
Security and Policies. At all times during the Term, Riskonnect shall provide all Services, use all resources related thereto, and use, operate, support, and maintain the RCMIS Systems, in a secure manner and in accordance with the County’s User Provisioning Policy (Attachment K) and Data Classification Policy (Attachment L) , as modified, supplemented, or replaced by the County or County from time to time, in its sole discretion, by providing Riskonnect with a written copy of such revised requirements, policies, or procedures reasonably in advance of the date that they are to be implemented and effective (collectively, the “Security Policies”). In the event that any revision, modification, supplement or replacement of any of the Security Policies causes Riskonnect to incur additional expense or deploy additional resources or otherwise increase the effort required by it to fulfill its obligations under this Contract, and Riskonnect so notifies County of such fact in advance and receives County’s approval to proceed, Riskonnect shall be entitled (subject to amendment of this Contract) to receive additional fees sufficient to compensate Riskonnect for such additional expense, additional resources or increased effort. Riskonnect shall at all times use industry best practices and methods with regard to the prevention, detection, and elimination, by all appropriate means, of fraud, abuse, and other inappropriate or unauthorized access to and use of RCMIS Systems and the networks involved with the provision or receipt of Services, including the implementation and deployment network management and maintenance applications and tools, the use of appropriate encryption technologies, and the other security-related Services described in this Contract. Riskonnect shall, and shall cause the Riskonnect Personnel and subcontractors to, fully comply with and abide by all such Security Policies at all times during the Term.
AutoNDA by SimpleDocs
Security and Policies. 16.1 The Supplier acknowledges and agrees that it must meet and maintain any requisite government security screening requirements as may be determined as necessary by EDC from time to time. The Supplier further agrees that it will cause its employees and agents, including the Representative, to take all necessary steps to meet such requirements. These requirements may involve verification of personal data, education/professional qualifications, employment history and other similar checks. The Supplier also agrees that it and its employees and agents, including the Representative, will comply with EDC’s Mutual Respect and Internet/E-Mail Policy, which EDC shall provide to the Supplier and the Representative in advance of the execution of this Agreement. The Supplier further acknowledges EDC’s commitment to employment equity and diversity in its workforce and understands that EDC encourages applications from all qualified candidates, including women, aboriginal peoples, people with disabilities and visible minorities. The Supplier agrees to work together with EDC to support its employment equity program when providing EDC with Representatives.
Security and Policies. At all times during the Term, Vendor shall provide all Services, use all resources related thereto, and use, operate, support, and maintain the Systems, in a secure manner and in accordance with the Client’s and Client’s security requirements, policies, and procedures as set forth in Attachment D attached hereto and as modified, supplemented, or replaced by the Client or Client from time to time, in its sole discretion, by providing Vendor with a written copy of such revised requirements, policies, or procedures reasonably in advance of the date that they are to be implemented and effective (collectively, the “Security Policies”). In the event that any revision, modification, supplement or replacement of any of the Security Policies causes Vendor to incur additional expense or deploy additional resources or otherwise increase the effort required by it to fulfill its obligations under this Agreement, and Vendor so notifies Client of such fact in advance and receives Client’s approval to proceed, Vendor shall be entitled to receive additional Fees sufficient to compensate Vendor for such additional expense, additional resources or increased effort. Vendor shall at all times use industry best practices and methods with regard to the prevention, detection, and elimination, by all appropriate means, of fraud, abuse, and other inappropriate or unauthorized access to and use of Systems and the networks involved with the provision or receipt of Services, including the implementation and deployment network management and maintenance applications and tools, the use of appropriate encryption technologies, and the other security-related Services described in this Agreement. In addition, all Vendor Personnel (including personnel of any Subcontractors) shall be subject to, and shall at all times conform to, all of the Client’s policies, procedures, rules, and requirements regarding the protection of premises, materials, equipment, and personnel, also as set forth in Attachment D attached hereto (and contained within the Security Policies). Vendor shall, and shall cause the Vendor Personnel and Subcontractors to, fully comply with and abide by all such Security Policies at all times during the Term. Any violation or disregard of such Security Policies by an individual Vendor Person or Subcontractor shall be cause for denial of access of such Person to the Client’s Systems or property. Vendor shall exercise due care and diligence to prevent any injury to person or damage ...
Security and Policies. At all times during the Term, Provider shall provide all Services, use all resources related thereto, and use, operate, support, and maintain the Systems, in a secure manner and in accordance with Client’s and Client’s information security, and other applicable security requirements, policies, and procedures as set forth in Schedule 10 attached hereto and as modified, supplemented, or replaced by Client or Client from time to time, in its sole discretion, by providing Provider with a written copy of such revised requirements, policies, or procedures reasonably in advance of the date that they are to be implemented and effective (collectively, the “Security Policies”). In the event that any revision, modification, supplement or replacement of any of the Security Policies causes Provider to incur, based on a good faith analysis, additional expense or deploy additional resources or otherwise increase the effort required by it to fulfill its obligations under this Agreement, and Provider so notifies Client of such fact in advance and receives Client’s approval to proceed, Provider and Client shall execute an In Scope Work Order which will address such costs and expenses as the Parties may mutually agree; provided, however, that Provider will absorb the first $50,000 of such costs. Provider shall at all times use industry best practices and methods with regard to the prevention, detection, and elimination, by all appropriate means, of fraud, abuse, and other inappropriate or unauthorized access to and use of Systems and the networks involved with the provision or receipt of Services, including the implementation and deployment network management and maintenance applications and tools, the use of appropriate encryption technologies, and the other security- related Services described in this Agreement. In addition, all Provider Personnel (including personnel of any Subcontractors) shall be subject to, and shall at all times conform to, all of Client’s policies, procedures, rules, and requirements regarding the protection of premises, materials, equipment, and personnel, also as set forth in Schedule 10 attached hereto (and contained within the Security Policies). Provider shall, and shall cause the Provider Personnel and Subcontractors to, fully comply with and abide by all such Security Policies at all times during the Term. Any violation or disregard of such Security Policies by an individual Provider Person or Subcontractor shall be cause for denial of access ...
Time is Money Join Law Insider Premium to draft better contracts faster.