Security of Information Systems Sample Clauses

Security of Information Systems. The Post and the Customer shall each ensure the security of the information system to prevent illegal entry, acquisition, alteration, or destruction of transaction records or the Customer’s personal data. With regard to dispute arising out of the hacking of the safeguard measures of the Post’s information system by a third party or the loophole of the Post’s information system, the Post bears the burden of proof to show that such fact does not exist. The Post shall be responsible for damages to the Customer caused by third party invasion into the Post’s information system.
AutoNDA by SimpleDocs
Security of Information Systems. As used in this section:
Security of Information Systems. If Seller stores or processes Confidential Information, which is controlled by the Company and to which Seller is disclosed or permitted access to by the Company during the course of providing the Services described in the PO, on computer systems of Seller, then Seller shall comply with the terms and conditions set forth in this section. Seller shall ensure that Confidential Information transmitted through a Public Network is protected using Secure FTP, Socket Layer (SSL), or an equivalent means of protection. Seller shall maintain and enforce its information security program at each location from which Seller provides Services. In addition, Seller shall ensure that its information security program covers all networks, systems, servers, computers, notebooks, laptops, PDAs, mobile phones, and other devices and media that process or handle Confidential Information or that has the ability to access to all Company networks, all Company systems, or all Company Confidential Information. Moreover, Seller shall ensure that its information security program includes industry standard password protections as appropriate, firewalls, and anti-virus and malware protections to protect Confidential Information stored on computer systems. (i) Anti-Malware Requirements - Seller shall implement anti-malware software on all systems that process, store, or transmit Confidential Information to ensure that all Confidential Information is free of malware (such as viruses, Trojan horses, worms, etc.), including laptops and other devices that process, store or transmit such Confidential Information. For Services that allow an end user to upload Confidential Information that is subsequently made available for download by end user, Seller shall scan the information for malware prior to making it available for download.
Security of Information Systems. The Bank and the Depositor shall each ensure the security of the information system to prevent illegal entry, acquisition, alteration or destruction of transaction records or the Depositor’s personal data. With regard to dispute arising out of the hacking of the safeguard measures or the loophole of the Bank’s information system by a third party, the Bank bears the burden of proof to show that such fact does not exist. The Bank shall be responsible to the Depositor for damages caused by the invasion of third party into the Bank’s information system.
Security of Information Systems. 7.1. The Attorney General and the Chief Justice acknowledge that the judiciary is responsible for policy for the security of Court Information and Judicial Information and acknowledge the need to maintain Information Systems with comprehensive security and privacy specifications for Court Information and Judicial Information, which, in respect of Judicial Information, are in compliance with the principles outlined in the Canadian Judicial Council's Blueprint for the Security of Judicial Information as published from time to time. 7.2. The Attorney General and the Chief Justice acknowledge that Judicial Information and Court Information must be safeguarded regardless of the organization that administers the Information System containing the Judicial Information and the Court Information, including Corporate Services Division, RCAS, or a commercial entity.

Related to Security of Information Systems

  • Security of Information Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site. Information must be encrypted both in-transit and at rest and applied in such a way that it renders data unusable to anyone but authorized personnel, and the confidential process, encryption key or other means to decipher the information is protected from unauthorized access. • It is compliant with the applicable provisions of the Washington State Office of the Chief Information Officer (OCIO) policy 141, Securing Information Technology Assets, available at: xxxxx://xxxx.xx.xxx/policy/securing-information-technology-assets. • It will provide DOH copies of its IT security policies, practices and procedures upon the request of the DOH Chief Information Security Officer. • DOH may at any time conduct an audit of the Contractor’s security practices and/or infrastructure to assure compliance with the security requirements of this contract. • It has implemented physical, electronic and administrative safeguards that are consistent with OCIO security standard 141.10 and ISB IT guidelines to prevent unauthorized access, use, modification or disclosure of DOH Confidential Information in any form. This includes, but is not limited to, restricting access to specifically authorized individuals and services through the use of: o Documented access authorization and change control procedures; o Card key systems that restrict, monitor and log access; o Locked racks for the storage of servers that contain Confidential Information or use AES encryption (key lengths of 256 bits or greater) to protect confidential data at rest, standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CMVP); o Documented patch management practices that assure all network systems are running critical security updates within 6 days of release when the exploit is in the wild, and within 30 days of release for all others; o Documented anti-virus strategies that assure all systems are running the most current anti-virus signatures within 1 day of release; o Complex passwords that are systematically enforced and password expiration not to exceed 120 days, dependent user authentication types as defined in OCIO security standards; o Strong multi-factor authentication mechanisms that assure the identity of individuals who access Confidential Information; o Account lock-out after 5 failed authentication attempts for a minimum of 15 minutes, or for Confidential Information, until administrator reset; o AES encryption (using key lengths 128 bits or greater) session for all data transmissions, standard algorithms validated by NIST CMVP; o Firewall rules and network address translation that isolate database servers from web servers and public networks; o Regular review of firewall rules and configurations to assure compliance with authorization and change control procedures; o Log management and intrusion detection/prevention systems; o A documented and tested incident response plan Any breach of this clause may result in termination of the contract and the demand for return of all personal information.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Protection of Information E1 Data Protection Xxx X0 Official Secrets Acts 1911, 1989, Section 182 of the Finance Xxx 0000 E3 Confidentiality E4 Freedom of Information E5 Security of Confidential Information E6 Publicity, Media and Official Enquiries E7 Security E8 Intellectual Property Rights and Assigned Deliverables E9 Audit and the National Audit Office

  • Preservation of Information The Trustee shall preserve, in as current a form as is reasonably practicable, the names and addresses of Certificateholders contained in the most recent list furnished to the Trustee as provided in Section 7.14, and the names and addresses of Certificateholders received by the Trustee in its capacity as Registrar, if so acting. The Trustee may destroy any list furnished to it as provided in Section 7.14, upon receipt of a new list so furnished.

  • Supply of Information The Republic agrees to deliver or cause to be delivered to each Stock Exchange copies of such documents as may be reasonably required for the purpose of obtaining such listing.

  • Use and Protection of Information Recipient agrees to protect such Information of the Discloser provided to Recipient from whatever source from distribution, disclosure or dissemination to anyone except employees of Recipient with a need to know such Information solely in conjunction with Recipient’s analysis of the Information and for no other purpose except as authorized herein or as otherwise authorized in writing by the Discloser. Recipient will not make any copies of the Information inspected by it.

  • Retention of Information You acknowledge and accept that the Bank will be required under the China Connect Rules to keep records in relation to Northbound trading for a period of not less than 20 years.

  • Availability of Information To make DHCS PI and PII available to the DHCS and/or 15 COUNTY for purposes of oversight, inspection, amendment, and response to requests for records, 16 injunctions, judgments, and orders for production of DHCS PI and PII. If CONTRACTOR receives 17 DHCS PII, upon request by COUNTY and/or DHCS, CONTRACTOR shall provide COUNTY and/or 18 DHCS with a list of all employees, contractors and agents who have access to DHCS PII, including 19 employees, contractors and agents of its subcontractors and agents.

  • Collection of Information You authorize us to access and download information from your Meter or from your PC Postage account. We may disclose this information to the USPS or other authorized governmental entity. We won’t share with any third parties (except the USPS or other governmental entity) individually identifiable information that we obtain about you in this manner unless required to by law or court order. We may elect to share aggregate data about our clients’ postage usage with third parties.

  • Provision of Information (a) For so long as any of the Certificates of any Class are “restricted securities” within the meaning of Rule 144(a)(3) under the Securities Act, each of the Depositor, the Master Servicer, the Securities Administrator and the Trustee agree to cooperate with each other to provide to any Certificateholders and to any prospective purchaser of Certificates designated by such holder, upon the request of such holder or prospective purchaser, any information required to be provided to such holder or prospective purchaser to satisfy the condition set forth in Rule 144A(d)(4) under the Securities Act. Any reasonable, out-of-pocket expenses incurred by the Trustee, the Master Servicer or the Securities Administrator in providing such information shall be reimbursed by the Depositor. (b) The Securities Administrator shall provide to any person to whom a Prospectus was delivered, upon the written request of such person specifying the document or documents requested, (i) a copy (excluding exhibits) of any report on Form 8-K, Form 10-D or Form 10-K (or other prescribed form) filed with the Securities and Exchange Commission pursuant to Section 6.21 and (ii) a copy of any other document incorporated by reference in the Prospectus. Any reasonable out-of-pocket expenses incurred by the Securities Administrator in providing copies of such documents shall be reimbursed by the Depositor. (c) On each Distribution Date, the Securities Administrator shall deliver or cause to be delivered by first class mail or make available on its website to the Depositor, Attention: Contract Finance, a copy of the report delivered to Certificateholders pursuant to Section 4.02.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!