Security Monitoring and Response Sample Clauses

Security Monitoring and Response. 4.1 Concessionaire shall maintain formal processes to detect, report, respond to, and mitigate and remediate Incidents in a timely manner. If Concessionaire learns or has reasonable suspicion that any person (including without limitation, Concessionaire’s personnel and third parties) has gained unauthorized access to City Information, or any person has gained unauthorized access to Concessionaire’s network and/or data storage facilities such that any City Information is obtained by an outside party, or the City Information has otherwise been disclosed to unauthorized parties (other than in the proper performance of those services or support therefor), each an “Incident”, then Concessionaire shall promptly (within 24 hours) (i) notify the City Attorney and Director in writing of the nature and extent of the Incident; (ii) conduct an investigation to determine when and, if possible, how the Incident occurred, and then (iii) assist the City in investigating and assessing the extent and nature of the Incident;
AutoNDA by SimpleDocs
Security Monitoring and Response. 4.1 Vendor shall maintain formal processes to detect, report, respond to, and mitigate and remediate Incidents in a timely manner. If Vendor learns or has reasonable suspicion that any person (including without limitation, Vendor’s personnel and third parties) has gained unauthorized access to City Information, or any person has gained unauthorized access to Vendor’s network and/or data storage facilities such that any City Information is obtained by an outside party, or the City Information has otherwise been disclosed to unauthorized parties (other than in the proper performance of those services or support therefor), each an “Incident”, then Vendor shall promptly (within 24 hours) (i) notify the City Attorney and Director in writing of the nature and extent of the Incident; (ii) conduct an investigation to determine when and, if possible, how the Incident occurred, and then (iii) assist the City in investigating and assessing the extent and nature of the Incident; (iv) use all reasonable endeavors to promptly remedy the Incident and prevent the occurrence of any similar Incident; and (v) inform the City upon request as to the current status of such endeavors. Vendor shall be liable for such data breach or unauthorized access, including but not limited to, any related costs or expense (including cost of notification) and any notification required by law or regulation.
Security Monitoring and Response 

Related to Security Monitoring and Response

  • Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • PERFORMANCE MONITORING AND REPORTING Performance indicators

  • Monitoring and Review The Provider agrees to allow access to the Department for purposes of monitoring and review. This access includes but is not limited to client records, fiscal records, staffing records, policy and procedural manuals, facilities, staff, and children in care of the Department. The Department will conduct quality reviews, which may include site-based quality review visits.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Monitoring and Reporting The Programme Operator shall monitor, record and report on progress towards the programme’s outcomes in accordance with the provisions contained in the legal framework. The Programme Operator shall ensure that suitable and sufficient monitoring and reporting arrangements are made with the project promoters in order to enable the Programme Operator and the National Focal Point to meet its obligations to the Donors. When reporting on progress achieved in Annual and Final Programme Reports, the Programme Operator shall disaggregate results achieved as appropriate and in accordance with instructions received from the FMO.

  • Program Monitoring and Evaluation The Recipient shall prepare, or cause to be prepared, and furnish to the Association not later than six months after the Closing Date, a report of such scope and in such detail as the Association shall reasonably request, on the execution of the Program, the performance by the Recipient and the Association of their respective obligations under the Legal Agreements and the accomplishment of the purposes of the Financing.”

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!