Security Assurance Sample Clauses

Security Assurance. Give such assurances and do all such things from time to time and at its own cost and expense as required by any applicable Legal Requirement or as the Security Trustee, acting reasonably, considers necessary to enable the Security Trustee to perfect, preserve, or protect any Security or to exercise any of the rights conferred on the Security Trustee.
AutoNDA by SimpleDocs
Security Assurance a. Access to security experts in the event you detect suspicious activity in your network.
Security Assurance. 3.4.1 Project security functions. Contractor undertakes design, construction, completion test, post completion test and ensure the security function of this Project, under this Contract and in subject to administrative regulations of construction engineering and design, administrative regulations of construction engineering quality and relevant law and regulation about safe production. 3.4.2 Safe construction and environment safety on site. Contractor subjects itself to article 7.8 about health, security and environment.
Security Assurance. At all times, both during the term of this Agreement and after its termination, Brand Influencer will keep in confidence and trust, and will not use or disclose, any Confidential Information without the prior written consent of Company, except (a) as may be necessary in the ordinary course of performing the Services under this Agreement for the benefit of Company, (b) as required by law or legal process, (c) during the course of litigation, so long as the disclosure is restricted in the same manner as the confidential information of other parties, and (d) in confidence to its legal counsel solely in
Security Assurance. A statement issued by the competent security authority declaring that classified information at RISERVATO level will be protected physicaly at the level of RISERVATIS­ SIMO/Stg.CONFIDENTIEEL.
Security Assurance. Participant shall maintain software assurance practices that minimize the risk that Participant and its Participant Technology and Partner Applications will introduce Security Vulnerabilities (defined below), including implementing processes and mechanisms (“Security Practices”) for verifying the authenticity and integrity of the software used or distributed by Participant, such as by using public key encryption. Upon request, Participant shall disclose to ServiceNow in reasonable detail its Security Practices (which disclosures shall be Confidential Information of Participant) and shall self-certify to ServiceNow that its Participant Technology and Partner Applications are developed, operated and maintained in accordance with software integrity and security standards developed by XXXXXxxx.xxx or other similar recognized authority. Participant shall promptly notify ServiceNow in the event that it has knowledge or becomes aware that its Participant Technology or Partner Applications or other implementation, product or service may degrade ServiceNow’s ability to meet its support and service availability terms, or pose a security risk to Customers, the Subscription Service or ServiceNow. Participant agrees to use reasonable efforts to assist XxxxxxxXxx, at Participant’s expense, to investigate and resolve any support or availability or security problems that may be caused by a Participant Technology, Participant Services or Partner Applications, in ServiceNow’s discretion.
Security Assurance. Supplier shall maintain a Risk Assessment Process which demonstrates the Security Assurance of Supplier’s Software and Hardware. This Process shall include, but is not limited to: 6.1. Supplier must, at Verizon’s cost, coordinate and conduct a Risk Assessment of its Software and Hardware using a Certified Verizon third-party security testing vendor. This Risk Assessment must be completed sixty (60) days prior to the initial delivery of Supplier Software and Hardware, respectively or as otherwise agreed upon by the Parties in writing. Supplier shall thereafter, at Verizon’s cost and discretion, repeat this Risk Assessment at the earlier of (1) every major version release or (2) annually for all Software and Hardware deployed in the Verizon network or hosted by Supplier. This Risk Assessment shall include the following: 6.1.1. A Threat Analysis of the Software and Hardware 6.1.2. A Penetration Test of the Software and Hardware 6.1.3. A Risk Assessment of the administrative, technical, logical and physical security controls of the pertinent operating environment, systems, networks, and facilities where Software and Hardware is hosted, if hosted by Supplier. 6.2. Supplier must resolve all high and medium risk Vulnerabilities identified in the Risk Assessment Process prior to production release except as otherwise specified by Verizon in writing. At Verizon request, Supplier shall provide to Application Service Provider Agreement - Synchronoss and Verizon Proprietary and Confidential Verizon a documented resolution timeline thirty (30) days before production release for all remaining Vulnerabilities to be remediated post production. This document shall include the date by which each Vulnerability will be remediated. 6.3. Verizon may request a copy of the scope of work from the above third-party Risk Assessment Process (Section 6.1). Supplier shall deliver this document to Verizon within two (2) business days of the initial request.
AutoNDA by SimpleDocs
Security Assurance. A stateThent issued by the coThpetent security authority declaring that classified inforThation at restricted level will be protected according to their national regulations.

Related to Security Assurance

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Solvency Assurances On the Closing Date, Administrative Agent and Lenders shall have received an Officer's Certificate dated the Closing Date, substantially in the form of Exhibit IX annexed hereto and with appropriate attachments, demonstrating that, after giving effect to the consummation of the transactions contemplated by the Credit Documents, Borrowers, taken as a whole, and Company will be Solvent.

  • Security Audit Customer agrees that PROS’ Audit Report will be used to satisfy any audit or inspection requests by or on behalf of Customer, and PROS will make Audit Reports available to Customer upon request. PROS will promptly remediate any material weaknesses or significant control deficiencies identified in any Audit Reports. In the event that an audit opinion is qualified and the qualification has not been remediated by the date of the Audit Report, PROS shall (i) provide Customer with PROS remediation plan; and (ii) execute such plan in accordance with its terms.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Quality Assurance The parties endorse the underlying principles of the Company’s Quality Management System, which seeks to ensure that its services are provided in a manner which best conforms to the requirements of the contract with its customer. This requires the Company to establish and maintain, implement, train and continuously improve its procedures and processes, and the employees to follow the procedures, document their compliance and participate in the improvement process. In particular, this will require employees to regularly and reliably fill out documentation and checklists to signify that work has been carried out in accordance with the customer’s specific requirements. Where necessary, training will be provided in these activities.

  • General Assurances In accordance with the Acts, the Regulations, and other pertinent directives, circulars, policy, memoranda, and/or guidance, the Recipient hereby gives assurance that it will promptly take any measures necessary to ensure that: The Civil Rights Restoration Act of 1987 clarified the original intent of Congress, with respect to Title VI and other Non-discrimination requirements (The Age Discrimination Act of 1975, and Section 504 of the Rehabilitation Act of 1973), by restoring the broad, institutional-wide scope and coverage of these non-discrimination statutes and requirements to include all programs and activities of the Recipient, so long as any portion of the program is Federally assisted.

  • UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union. 5:02 The Corporation agrees to deduct from the earnings of all employees, including probationary employees, covered by this Agreement, an amount each month as dues and upon completion of the probationary period an amount for the initiation fee. The amount of such dues and initiation fees shall be advised in writing by the I.B.E.W., Local 2351 and changes to such amounts shall be advised not less than four (4) weeks prior to the effective date. Dues collected shall be remitted within ten (10) days after each pay period, to the designated official of the Union along with a statement of the names, in alphabetical order, and amounts deducted from each employee. The statement will also include the names of employees whose wages are insufficient to permit such deduction and the Corporation will only be obligated to make such deduction from the immediate subsequent pay period. Employees on recall status must be members in good standing of the Union in order to be recalled. 5:03 The Union agrees that neither it nor any of its officers or members will engage in Union activities on Corporation time, or Corporation work area, except as provided in this Agreement. 5:04 The Union shall indemnify and save the Corporation harmless against any and all claims, demands, suits or other forms of liability that shall arise from or by reason of action taken or not taken by the Corporation for the purpose of complying with this Article. 5:05 The Corporation will submit monthly to the Union a list of the dates of new hires, terminations and transfers to and from the Bargaining Unit for the previous month. 5:06 The Union agrees to furnish the Corporation with the names of all personnel including officers, representatives, stewards and committee people who are authorized to represent the Union in its relations with the Corporation. 5:07 The Corporation agrees to supply all employees with a copy of the Collective Agreement and will endeavour to do so within one (1) month after receipt from the printer. 5:08 The Corporation shall provide bulletin boards in designated areas for the posting of Union notices dealing with meetings, election of officers, appointments and committees, social affairs and other non-controversial matters dealing with the affairs of the Union. No bulletin shall be posted until approved by the Human Resources Division or the designated Corporate representative.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!