Security and Regulatory Recommendations Sample Clauses

Security and Regulatory Recommendations. Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding regulatory compliance, safety and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols. NETWORK CHANGE COORDINATION
AutoNDA by SimpleDocs
Security and Regulatory Recommendations. Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding regulatory compliance, safety, and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols. Password-Management Services If Provider provides password management services to Client, Client shall be responsible and liable for any unauthorized use of passwords. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY, OR DAMAGE TO CLIENT OR ANY THEFT OF PASSWORDS CAUSED BY SUCH USE OF THE PASSWORD SERVICES BY CLIENT.
Security and Regulatory Recommendations. Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding regulatory compliance, safety, and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols. Password-Management Services If Provider provides password management services to Client, Client shall be responsible and liable for any unauthorized use of passwords. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY, OR DAMAGE TO CLIENT OR ANY THEFT OF PASSWORDS CAUSED BY SUCH USE OF THE PASSWORD SERVICES BY CLIENT. PROVIDER REPRESENTATIONS AND WARRANTY Internal Network Security Compromise Policy Provider monitors the availability and performance of its internal firewall and network security. This process involves monitoring for intrusion attempts and potential security breaches. In order to minimize a possible compromise of security, all services and applications exposed to the Internet on Provider's servers are updated with all commonly available security hotfixes and best practices. As appropriate, Provider proactively evaluates, investigates, and reports security-related incidents to the appropriate authorities. Provider also monitors and proactively manages the anti-virus protection of its servers and applications using industry-recognized anti- virus software systems.
Security and Regulatory Recommendations. Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding regulatory compliance, safety and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols. PROVIDER REPRESENTATIONS AND WARRANTY Internal Network Security Compromise Policy Provider monitors the availability and performance of its internal firewall and network security. This process involves monitoring for intrusion attempts and potential security breaches. In order to minimize a possible compromise of security, all services and applications exposed to the Internet on Provider's servers are updated with all commonly available security hotfixes and best practices. As appropriate, Provider proactively evaluates, investigates and reports security-related incidents to the appropriate authorities. Provider also monitors and proactively manages the anti- virus protection of its servers and applications using industry- recognized anti-virus software systems. Service Warranty We warrant that the Services will be performed in a professional and workmanlike manner and as described in an applicable Service Attachment. All Services will be deemed to be accepted unless Client notifies Provider in writing within ten (10) working days after performance that the Services did not conform to this warranty. Provider promptly will correct any non-conformities and will notify Client in writing that the non-conformities have been corrected. DISCLAIMER OF WARRANTY PROVIDER DOES NOT WARRANT THAT THE SERVICES WILL BE PERFORMED ERROR-FREE OR UNINTERRUPTED, THAT PROVIDER WILL CORRECT ALL SERVICES ERRORS, OR THAT THE SERVICES WILL MEET YOUR REQUIREMENTS OR EXPECTATIONS, OR THAT THE SERVICE WILL BE COMPLETELY SECURE. THERE ARE RISKS INHERENT IN INTERNET CONNECTIVITY THAT COULD RESULT IN THE TEMPORARY LOSS OF SERVICE AVAILABILITY. PROVIDER IS NOT RESPONSIBLE FOR ANY ISSUES RELATED TO THE PERFORMANCE, OPERATION OR SECURITY OF THE SERVICES THAT ARISE FROM YOUR CONTENT OR THIRD PARTY CONTENT OR SERVICES PROVIDED BY THIRD PARTIES. PROVIDER S...
Security and Regulatory Recommendations. Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding regulatory compliance, safety and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols. Internal Network Security Compromise Policy PRO V I D E R RE PRE S E N T AT I O N S AN D W ARRAN T Y Provider monitors the availability and performance of its internal firewall and network security. This process involves monitoring for intrusion attempts and potential security breaches. In an attempt to minimize a possible compromise of security, the Services and applications exposed to the Internet on Provider's servers are periodically updated with available critical security hotfixes and critical security patches. As appropriate, Provider proactively evaluates, investigates and reports security-related incidents to the appropriate authorities. Provider also monitors and proactively manages the anti-virus protection of its servers and applications using industry-recognized anti-virus software systems.
Security and Regulatory Recommendations. Although it is under no obligation to do so, from time to time, Provider may provide Client with specific advice, recommendations, and directions related to the Services, regulatory compliance, safety, and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client hereby acknowledges that it is responsible and will indemnify and hold Provider harmless for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols. If Client’s failure to follow or implement Provider’s advice renders part or all of the Services economically or technically unreasonable, Provider may terminate the applicable Order.
Security and Regulatory Recommendations. Although it is under no obligation to do so; from time to time, Provider may make recommendations regarding regulatory compliance, safety and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols. Significant Changes to Customer’s Network NETWORK CHANGE COORDINATION You will notify us via email of all significant proposed network changes and will provide us with at least thirty (30) days advance notice to provide opportunity to comment and follow-up regarding proposed changes. Research Regarding Network Changes Evaluation of network change requests sometimes will require significant research, design, and testing by Provider. These types of requests are not covered by this Service Attachment and will be billed at our then-current rates for time and materials.
AutoNDA by SimpleDocs

Related to Security and Regulatory Recommendations

  • Governing Law, Regulatory Authority, and Rules The validity, interpretation and enforcement of this Agreement and each of its provisions shall be governed by the laws of the state of New York, without regard to its conflicts of law principles. This Agreement is subject to all Applicable Laws and Regulations. Each Party expressly reserves the right to seek changes in, appeal, or otherwise contest any laws, orders, or regulations of a Governmental Authority.

  • Conclusion and Recommendations D. Evaluations for Offenders without a sex offense conviction shall answer the following additional referral questions in the evaluations:

  • Statutory and Regulatory Compliance Contractor shall comply with all laws and regulations applicable to the Community Development Block Grant-Disaster Recovery funds appropriated by the Disaster Relief Appropriations Act, 2013 (Pub. L. 113-2), including but not limited to the applicable Office of Management and Budget Circulars, which may impact the administration of funds and/or set forth certain cost principles, including the allowability of certain expenses.

  • REGULATORY FILINGS AND CAISO TARIFF COMPLIANCE 3.1 Filing

  • APPROVAL OF GENERAL COMMUNICATIONS Competitive Supplier may only communicate with Program participants and/or use the lists of Eligible Consumers/Program participants to send Department-approved education materials, opt- out notices, or other communications essential to the operation of the Program. Such lists may not be used by Competitive Supplier to market any additional products or services to Eligible Consumers or Program Participants. Competitive Supplier shall cooperate with and assist the Town in the drafting and sending of messages and information to Eligible Consumers concerning the Program or any matter arising under or related to this Agreement or the Program. Competitive Supplier shall, prior to sending any direct mail, advertising, solicitation, bill insert, electronic mail, or other similar written or electronic communication (collectively, “General Communications”) to Participating Consumers (but excluding individually drafted or tailored communications responding to a specific complaint or communication of an individual consumer), provide a copy of such General Communication to the Town for its review (for consistency with the Town’s purposes and goals) and approval. The Town shall have the right to disapprove such General Communications and suggest revisions if it finds the communication inconsistent with the purposes and goals of the Town, factually inaccurate, not essential to the operation of the program, or likely to mislead provided, however, that: (i) the communication shall be deemed approved if the Town fails to respond within ten (10) Business Days, and (ii) no approval shall be necessary for any communication (a) regarding any emergency situation involving any risk to the public health, safety or welfare; (b) that has been approved by the Department, the DOER; or (c) in the nature of routine monthly or periodic bills, or collection notices, except that any bill insert or message included at the bottom of such bill not within the scope of (a) or (b) above shall require advanced review and approval by the Town; and (iii) no approval or lack of approval shall relieve the Competitive Supplier of its obligations and responsibility for its actions and omissions under this Agreement, or other than as set forth in sub-clause ‘i’ of this Section 7.6, result in a waiver of any rights, remedies or defenses of the Town. The Town may reject or exclude any proposed General Communication that, in its reasonable judgment, is contrary to the interests and objectives of the Program or the Town.

  • SUPPLIER PUBLICATIONS 4.1 Any marketing materials in relation to this Framework Agreement that that Supplier produces must comply in all respects with the Branding Guidance. The Supplier will periodically update and revise such marketing materials.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!