Security of System Files Sample Clauses

Security of System Files. To protect Supplier Information Processing Systems and system files containing Confidential Information, Supplier will ensure that access to source code is restricted to authorized users who have a direct need to know. Supplier will: (a) Ensure that the integrity of files in the operating environment are maintained and monitored for approved change; (b) Ensure that all systems and software have the latest vendor-supplied security patches; (c) Establish a process to identify newly discovered security vulnerabilities and update system and application standards to address new vulnerability issues; and (d) Ensure internal and external network vulnerability scans are conducted at least quarterly and network and application layer penetration testing at least once a year.
AutoNDA by SimpleDocs
Security of System Files. 1. NautaDutilh controls access to system files and the program’s source code. 2. Exposure of sensitive or critical data in test environments is strictly prohibited. Test data are carefully selected, protected and controlled. 3. The installation of software on production systems is strictly limited to the allocated functions within the ICT organisation.
Security of System Files. To protect Provider Information Processing Systems and system files containing Recipient Confidential Information, Provider will ensure that access to source code is restricted to authorized users who have a direct need to know. 10.1.1 Ensure that systems and software have the latest vendor-supplied security patches. 10.1.2 Establish a process to identify newly discovered security vulnerabilities and update system and application standards to address new vulnerability issues. 10.1.3 Ensure internal and external network vulnerability scans are conducted at least quarterly and network and application layer penetration testing at least once a year
Security of System Files. Access to source code must be limited and controlled. During and after development, all applications must ensure the security of system files, plus access to source code and test data. All back-door maintenance hooks must be removed from the application before production use. Application architecture must prohibit databases containing confidential information from residing on the same server as the application.
Security of System Files. To protect Information Processing System(s) and system files containing Protected Information, TrueCar will restrict access to source code to authorized users who have a direct need to know.

Related to Security of System Files

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Security of State Information The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Access to Files A copy of any completed evaluation which is to be placed in a nurse’s file shall be first reviewed with the nurse. The nurse shall initial such evaluation as having been read and shall have the opportunity to add her views to such evaluation prior to it being placed in her file. It is understood that such evaluations do not constitute disciplinary action by the Hospital against the nurse. Each nurse shall have reasonable access to all her files for the purpose of reviewing their contents in the presence of her supervisor. A copy of the evaluation will be provided to the nurse at her request. No document shall be used against a nurse where it has not been brought to her attention in a timely manner. Any letter of reprimand, suspension or other sanction will be removed from the record of a nurse eighteen months following the receipt of such letter, suspension or other sanction provided that the nurse’s record has been discipline free for one year. Newly hired part-time nurses shall beconsidered to be on probation for a period of sixty tours worked hours of work for nurses whose regular hours of work are other than the standard work day). If retained the sixty tours hours) worked. With the written consent of the or her designate, such probationary period may be extended. Where the Hospital requests an extension of the probationary period, it will provide notice to the Association at least fourteen calendar days prior to the expected date of expiration of the initial probationary period. It is to the probationary period will not exceed an additional sixty tours hours) worked and, where requested, the Hospital will advise the nurse and the Association of the basis of such extension. A nurse who transfers from casual part-time or full-time to regular not has previously completed one since her date of last hire. Where no such probationary period has been served, the number of tours worked (hours worked for nurses whose regular hours of work are other than the standard work day) during the nine months immediately preceding the transfer shall be credited towards the probationary period.

  • Inspection of Property; Books and Records; Discussions Keep proper books of records and account in which full, true and correct entries in conformity with GAAP and all Requirements of Law shall be made of all dealings and transactions in relation to its business and activities; and permit representatives of any Lender (upon reasonable advance notice coordinated through the Administrative Agent) to visit and inspect any of its properties and examine and make abstracts from any of its books and records at any reasonable time and as often as may reasonably be desired and to discuss the business, operations, properties and financial and other condition of the Borrower and its Subsidiaries with officers and employees of the Borrower and its Subsidiaries and with its independent certified public accountants.

  • Inspection of Property and Books and Records The Company shall maintain and shall cause each Subsidiary to maintain proper books of record and account, in which full, true and correct entries in conformity with GAAP consistently applied shall be made of all financial transactions and matters involving the assets and business of the Company and such Subsidiary. The Company shall permit, and shall cause each Subsidiary to permit, representatives and independent contractors of the Agent or any Bank to visit and inspect any of their respective properties, to examine their respective corporate, financial and operating records, and make copies thereof or abstracts therefrom, and to discuss their respective affairs, finances and accounts with their respective directors, officers, and independent public accountants, all at the expense of the Company and at such reasonable times during normal business hours and as often as may be reasonably desired, upon reasonable advance notice to the Company; provided, however, when an Event of Default exists the Agent or any Bank may do any of the foregoing at the expense of the Company at any time during normal business hours and without advance notice.

  • Records and Files The CNA shall maintain records, reports, and files to document the inspections conducted by the CNA and any necessary corrective action taken (as appropriate). Copies of all QCP related inspection reports and other documents shall be made available to the Commission when requested. All such documents shall be maintained by the CNA.

  • Inspection of Property, Books and Records The Borrower will keep, and will cause each Subsidiary to keep, proper books of record and account in which full, true and correct entries shall be made of all dealings and transactions in relation to its business and activities; and will permit, and will cause each Subsidiary to permit, representatives of any Bank at such Bank's expense to visit and inspect any of their respective properties, to examine and make abstracts from any of their respective books and records and to discuss their respective affairs, finances and accounts with their respective officers, employees and independent public accountants, all at such reasonable times and as often as may reasonably be desired.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Access to Records; Contractor Financial Records Contractor agrees that District and its authorized representatives are entitled to review all Contractor books, documents, papers, plans, and records, electronic or otherwise (“Records”), directly pertinent to this Contract for the purpose of making audit, examination, excerpts, and transcripts.

  • Access to Collateral; Books and Records Allow Bank, or its agents, at reasonable times, on one (1) Business Day’s notice (provided no notice is required if an Event of Default has occurred and is continuing), to inspect the Collateral and audit and copy Borrower’s Books. Such inspections or audits shall be conducted no more often than once every twelve (12) months unless an Event of Default has occurred and is continuing in which case such inspections and audits shall occur as often as Bank shall determine is necessary. The foregoing inspections and audits shall be at Borrower’s expense, and the charge therefor shall be Eight Hundred Fifty Dollars ($850) per person per day (or such higher amount as shall represent Bank’s then-current standard charge for the same), plus reasonable out-of-pocket expenses. In the event Borrower and Bank schedule an audit more than ten (10) days in advance, and Borrower cancels or seeks to reschedule the audit with less than ten (10) days written notice to Bank, then (without limiting any of Bank’s rights or remedies), Borrower shall pay Bank a fee of One Thousand Dollars ($1,000) plus any out-of-pocket expenses incurred by Bank to compensate Bank for the anticipated costs and expenses of the cancellation or rescheduling.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!