Security Management Services Sample Clauses

Security Management Services. Riskonnect shall provide appropriate and comprehensive security Services, that meet the County’s security requirements identified in Schedule A, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the RCMIS Systems and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the County Data. Without limiting anything set forth in the Scope of Work, such Services shall include operating RCMIS Systems under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Riskonnect, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
AutoNDA by SimpleDocs
Security Management Services. OneNeck shall provide the following services, which shall comprise “Security Management Services,” provided, however, that any obligations set forth in this Article 5.7 shall be in addition to and shall in no way limit any other obligations of OneNeck regarding security as may be required by Client.
Security Management Services. Contractor shall provide appropriate and comprehensive security Services, that meet County’s security requirements identified in Attachment E, PIMS Delivery Hosted/Managed, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the PIMS and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of County Data. Without limiting anything set forth in Attachment A, Scope of Work, such Services shall include operating PIMS under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
Security Management Services. Contractor shall provide appropriate and comprehensive security Services, that meet County’s security requirements identified in Attachment D, ITMS Technical Requirements, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the ITMS and County Data, and to protect against unauthorized access to, use of, or intrusion into, the systems and unauthorized disclosure of the County Data. Without limiting anything set forth in the Scope of Work, such services shall include operating ITMS under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances to which County and Contractor are subject relating to security, privacy, or confidentiality, ensuring compliance with County security policies and procedures provided and made available to Contractor in this Contract, performing all necessary and appropriate security- related audits and reports, and, to the extent practically possible and upon request, promptly providing the County with a full and complete copy of each such report.
Security Management Services. The Contractor shall provide appropriate and comprehensive security Services, that meet the County’s security requirements as required by this Contract and in Attachment FSolution Delivery Hosted/Managed, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the Agenda system and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the County Data. Without limiting anything set forth in the Scope of Work, such Services shall include operating Agenda system under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to the Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing the County with a full and complete copy of each such report. Anti-Malware Protections: The Contractor’s data center shall have strong access controls and secure practices, such as specialized authorization system(s), in effect at all times to prevent unauthorized physical and virtual access to hosted County systems. The Contractor servers and network equipment hosted at the data center shall be properly secured from the threat of cyber hackers and viruses through appropriate intrusion detection tools, proactive 24x7x365 monitoring and prompt installation of new software updates, hot fixes and security patches. The Contractor shall use industry best practices regularly to identify, screen, and prevent any Disabling Device in resources utilized by the Contractor in connection with the provision or receipt of the Services and shall not itself knowingly or intentionally install (and shall prevent its subcontractors from knowingly and intentionally installing) any Disabling Device in resources utilized by the Contractor, the County, or any subcontractor, in connection with the provision or receipt of the Services. A “Disabling Device” is a computer virus, timer, clock, counter, time lock, time bomb, or other limiting design, instruction, or routine that would purposely and inappropriately erase data or programming or cause any resource to become inoperable or otherwise incapable of being used in the full manner for...
Security Management Services. Contractor shall provide appropriate and comprehensive security Services, that meet the County’s security requirements identified in Schedule A, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the eGovernment Systems and County Confidential Information, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the County Confidential Information. Without limiting anything set forth in the Scope of Work, such Services shall include operating eGovernment Systems under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County Security Policies and Principles and procedures provided or made available to Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
Security Management Services. Provider shall provide appropriate and comprehensive security Services, as further described in the applicable appendices to the Statements of Work (Schedule 2), using industry best practices and methods, commercially available technology, to at all times ensure the security, integrity, and confidentiality of the Systems and Client Data.
AutoNDA by SimpleDocs
Security Management Services. Vendor shall provide appropriate and comprehensive security Services, as further described in Appendix 2 to Schedule 3.3, using industry best practices and methods, commercially available technology, to at all times ensure the security, integrity, and confidentiality of the Systems and Commonwealth Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the Commonwealth Data. Without limiting anything set forth in the Statements of Work, such Services shall include, in accordance with Section 13, providing a centralized Vendor security organization or group that is responsible for all aspects of such security Services, routinely performing all necessary and appropriate security assessments and evaluations, developing and implementing a security plan (subject to the reasonable written approval of the Commonwealth) that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with Commonwealth and VITA security policies and procedures provided or made available to Vendor, performing all necessary and appropriate security-related audits and reports, and promptly providing VITA with a full and complete copy of each such report. Vendor shall also
Security Management Services. Vendor shall provide appropriate and comprehensive security Services, as further described in the applicable appendices to Schedule 2, using industry best practices and methods, commercially available technology, to at all times ensure the security, integrity, and confidentiality of the Systems and Client Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the Client Data. Without limiting anything set forth in the Statements of Work, such Services shall include providing a centralized Vendor security organization or group that is responsible for all aspects of such security Services, routinely performing all necessary and appropriate security assessments and evaluations, developing and implementing a security plan (subject to the reasonable written approval of the Client) that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with Client and Client security policies and procedures provided or made available to Vendor, performing all necessary and appropriate security-related audits and reports, and promptly providing Client with a full and complete copy of each such report.
Security Management Services. Contractor shall provide appropriate and comprehensive security services that meet County’s security requirements, using industry standards and practices and methods, and commercially available technology, to at all times ensure the security and integrity of the CMMS and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Contractor’s Systems and unauthorized disclosure of County Data not caused by County. Without limiting anything set forth in Attachment A, Scope of Work, such Services shall include operating the CMMS under a security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report. Without limiting any other audit rights of County, County shall have the right to review Contractor’s data privacy and information security program prior to the commencement of Services and from time to time during the term of this Contract but not more frequently than annually. In addition, during the term of this Contract from time to time and with reasonable notice, County, at its own expense, shall be entitled to perform, or to have performed, an on-site audit of Contractor’s data privacy and information security program.
Time is Money Join Law Insider Premium to draft better contracts faster.