Security of the SaaS Services Sample Clauses

Security of the SaaS Services. Customer shall safeguard the SaaS Services and Accounts from unauthorized access or use by any individual who is not a User, including by (a) maintaining the security and confidentiality of all Security Credentials, (b) ensuring that only Users have access to Security Credentials, (c) securing Customer Devices to prevent unauthorized access or use of the SaaS Services, (d) preventing the installation of any viruses, malware or other malicious code on Customer Devices, (e) preventing the transmission of any viruses or malicious code to the SaaS Services through Customer Devices, and (f) maintaining industry standard antivirus software on Customer Devices. Customer shall notify Grass Valley promptly upon becoming aware of any unauthorized disclosure, access to, or use of any SaaS Services or any Security Credentials, or any other violation of this Section.
AutoNDA by SimpleDocs
Security of the SaaS Services. Advanced Channel Partner shall safeguard the SaaS Services and Accounts from unauthorized access or use by any individual who is not a User, including by (a) maintaining the security and confidentiality of all Security Credentials, (b) ensuring that only Users have access to Security Credentials, (c) securing Advanced Channel Partner Devices to prevent unauthorized access or use of the SaaS Services, (d) preventing the installation of any viruses, malware or other malicious code on Advanced Channel Partner Devices, (e) preventing the transmission of any viruses or malicious code to the SaaS Services through Advanced Channel Partner Devices, and
Security of the SaaS Services. Managed Service Provider shall safeguard the SaaS Services and Accounts from unauthorized access or use by any individual who is not a User, including by (a) maintaining the security and confidentiality of all Security Credentials, (b) ensuring that only Users have access to Security Credentials, (c) securing Managed Service Provider Devices to prevent unauthorized access or use of the SaaS Services, (d) preventing the installation of any viruses, malware or other malicious code on Managed Service Provider Devices, (e) preventing the transmission of any viruses or malicious code to the SaaS Services through Managed Service Provider Devices, and
Security of the SaaS Services. Customer shall safeguard the SaaS Services from unauthorized access or use by any individual who is not a User, including by (a) maintaining the confidentiality of all passwords, login credentials, user names, physical or electronic keys provided by Grass Valley and all other access or login information (collectively, “Security Credentials”), (b) ensuring that only Users have access to Security Credentials, (c) securing Customer Devices to prevent unauthorized access or use of the SaaS Services, (d) preventing the installation of any viruses or other malicious code on Customer Devices, (e) preventing the transmission of any viruses or malicious code to the SaaS Services through Customer Devices, and (f) maintaining industry standard antivirus software on Customer Devices. Customer shall notify Grass Valley promptly upon becoming aware of any unauthorized disclosure, access to, or use of the SaaS Services or the Security Credentials, or any other violation of this Section 4.3 (Security of the SaaS Services).
Security of the SaaS Services. Managed Service Provider shall safeguard the SaaS Services and Accounts from unauthorized access or use by any individual who is not a User, including by (a) maintaining the security and confidentiality of all Security Credentials, (b) ensuring that only Users have access to Security Credentials, (c) securing Managed Service Provider Devices to prevent unauthorized access or use of the SaaS Services, (d) preventing the installation of any viruses, malware or other malicious code on Managed Service Provider Devices, (e) preventing the transmission of any viruses or malicious code to the SaaS Services through Managed Service Provider Devices, and (f) maintaining industry standard antivirus software on Managed Service Provider Devices. Managed Service Provider shall notify Grass Valley promptly upon becoming aware of any unauthorized disclosure, access to, or use of any SaaS Services or any Security Credentials, or any other violation of this Section.

Related to Security of the SaaS Services

  • SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.

  • Procurement of the Site (i) The Authority Representative, the Contractor and Authority’s Engineer shall, within 10 (ten) days of the date of this Agreement, inspect the Site and prepare a detailed memorandum containing an inventory of the Site including the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site (hereinafter referred to as the “Handover Memorandum”). Subject to the provisions of Clause 8.2 (iii), the Handover Memorandum shall have appended thereto an appendix (the “Appendix”) specifying in reasonable detail those parts of the Site to which vacant access and Right of Way has not been given to the Contractor along with details of hindrances in the Construction Zone. For sake of clarity the Handover Memorandum shall clearly specify the parts of Site where work can be executed. Signing of the Handover Memorandum, in three counterparts (each of which shall constitute an original), by the authorized representatives of the Authority, Contractor and Authority’s Engineer shall be deemed to constitute a valid evidence of giving the Right of Way to the Contractor for discharging its obligations under and in accordance with the provisions of this Agreement and for no other purpose whatsoever. (ii) Whenever the Authority is ready to hand over any part or parts of the Site included in the Appendix, it shall inform the Contractor, by notice, of the proposed date and time such of hand over. The Authority Representative and the Contractor shall, on the date so notified, inspect the specified parts of the Site, and prepare a memorandum containing an inventory of the vacant and unencumbered land, buildings, structures, road works, trees and any other immovable property on or attached to the Site so handed over. The signing of the memorandum, in three (3) counterparts (each of which shall constitute an original), by the authorised representatives of the Parties shall be deemed to constitute a valid evidence of giving the relevant Right of Way to the Contractor. If the contractor fails to join for site inspection or disputes the parts of the site available for work, the Authority’s Engineer shall decide the parts of the site where work can be executed and notify to both the parties within 3 days of the proposed date of inspection. The parties agree that such notification of the Authority’s Engineer as mentioned hereinabove shall be final and binding on the parties. (iii) The Authority shall provide the Right of Way to the Contractor in respect of all land included in the Appendix by the date specified in Schedule-A for those parts of the Site referred to therein, and in the event of delay for any reason other than Force Majeure or breach of this Agreement by the Contractor, it shall pay to the Contractor, Damages in a sum calculated in accordance with Clause 8.3. The Contractor agrees that it shall not be entitled to claim any other damages on account of any such delay by the Authority. (iv) Notwithstanding anything to the contrary contained in this Clause 8.2, the Authority shall specify the parts of the Site, if any, for which Right of Way shall be provided to the Contractor on the dates specified in Schedule-A. Such parts shall also be included in the Appendix prepared in pursuance of Clause 8.2 (i). (v) The Authority further acknowledges and agrees that prior to the Appointed Date, it shall have procured issuance of the statutory notification under Applicable Laws for vesting of all the land comprising the Project in the Authority and has taken possession of area for Construction Zone for at least 90% (ninety per cent) of the total length of the Project Highway. The Parties also acknowledge and agree that the conditions specified in this Clause 8.2 (iii) shall not be modified or waived by either Party. (vi) For the avoidance of doubt, the Parties expressly agree that the Appendix shall in no event contain sections of the Project Highway the cumulative length of which exceeds 10% (ten percent) of the total length of the Project Highway. (vii) Pursuant to signing of Handover Memorandum under clause 8.2 (i), Contractor shall submit to the Authority’s Engineer, a monthly land possession report till expiry of 180 (one hundred and eighty) days from Appointed Date, in respect of those parts of the site to which vacant access and right of way was not given to the contractor and included in Appendix to the memorandum signed under clause 8.2 (i), duly specifying the part of the site, if any, for which the right of way is yet to be handed over.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • B1 The Services The Contractor shall supply the Services during the Contract Period in accordance with the Authority’s requirements as set out in the Specification and the provisions of the Contract in consideration of the payment of the Contract Price. The Authority may inspect and examine the manner in which the Contractor supplies the Services at the Premises during normal business hours on reasonable notice.

  • Manager’s Use of the Services of Others The Manager may (at its cost except as contemplated by Paragraph 4 of this Agreement) employ, retain or otherwise avail itself of the services or facilities of other persons or organizations for the purpose of providing the Manager or the Corporation or Fund, as appropriate, with such statistical and other factual information, such advice regarding economic factors and trends, such advice as to occasional transactions in specific securities or such other information, advice or assistance as the Manager may deem necessary, appropriate or convenient for the discharge of its obligations hereunder or otherwise helpful to the Corporation or Fund, as appropriate, or in the discharge of Manager's overall responsibilities with respect to the other accounts which it serves as investment manager.

  • Disaster Services In the event of a local, state, or federal emergency, including natural, man-made, criminal, terrorist, and/or bioterrorism events, declared as a state disaster by the Governor, or a federal disaster declared by the appropriate federal official, Grantee may be called upon to assist the System Agency in providing the following services: i. Community evacuation; ii. Health and medical assistance; iii. Assessment of health and medical needs; iv. Health surveillance; v. Medical care personnel; vi. Health and medical equipment and supplies; vii. Patient evacuation; viii. In-hospital care and hospital facility status; ix. Food, drug and medical device safety; x. Worker health and safety; xi. Mental health and substance abuse; xii. Public health information; xiii. Vector control and veterinary services; and xiv. Victim identification and mortuary services.

  • Scope of the Services UNOPS intends to retain the Contractor for the implementation of the Services, and the Contractor intends to provide the Services. The Contractor has represented to UNOPS that it has the appropriate experience, expertise, licences, and resources to undertake the Services and has agreed to undertake the Services in accordance with the Contract. In reliance on the Contractor’s representations UNOPS has entered into the Contract. The Contract sets out the terms and conditions upon which the Contractor will undertake the Services.

  • Continuity of Services A. The Contractor recognizes that the service(s) to be performed under this Contract are vital to the State and must be continued without interruption and that, upon Contract expiration, a successor, either the State or another contractor, may continue them. The Contractor agrees to: Furnish phase-in training; and Exercise its best efforts and cooperation to effect an orderly and efficient transition to a successor. B. The Contractor shall, upon the State's written notice: Furnish phase-in, phase-out services for up to sixty (60) days after this Contract expires; and Negotiate in good faith a plan with a successor to determine the nature and extent of phase-in, phase-out services required. The plan shall specify a training program and a date for transferring responsibilities for each division of work described in the plan, and shall be subject to the State's approval. The Contractor shall provide sufficient experienced personnel during the phase-in, phase-out period to ensure that the services called for by this Contract are maintained at the required level of proficiency. C. The Contractor shall allow as many personnel as practicable to remain on the job to help the successor maintain the continuity and consistency of the services required by this Contract. The Contractor also shall disclose necessary personnel records and allow the successor to conduct on-site interviews with these employees. If selected employees are agreeable to the change, the Contractor shall release them at a mutually agreeable date and negotiate transfer of their earned fringe benefits to the successor. D. The Contractor shall be reimbursed for all reasonable phase-in, phase-out costs (i.e., costs incurred within the agreed period after contract expiration that result from phase-in, phase-out operations).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!