Security Patching Sample Clauses

Security Patching. Comcast shall have procedures in place to regularly update and patch operating systems and software that contain or access Company PI. Comcast shall implement updates it determines are critical in an accelerated timeline.
AutoNDA by SimpleDocs
Security Patching. When a security patch becomes available, the Supplier must ensure it patches any part of its network that stores or processes Amplitel Data or connects to Amplitel’s networks as soon as reasonably practicable.
Security Patching. The Supplier will provide and apply patches to the Oracle database, application servers, and updates to the application, and will liaise with relevant Customer departments to schedule maintenance windows for performing this. The patching of the operating system is the Supplier’s responsibility and will be delivered in collaboration with the Cloud Hosting partner.
Security Patching. When a security patch becomes available, the Supplier must ensure it patches any part of its network that stores or processes Telstra Data or connects to Telstra’s networks as soon as reasonably practicable.
Security Patching. 13.1. The Customer authorises Cantarus for the duration of this MSA to apply Security Updates or other mitigations relating to a Security Vulnerability where in Cantarus’ reasonable opinion the risk to the performance and security of either Party’s Software, Confidential Information, Personal Data and other data and content justifies such action. 13.2. The Customer understands and accepts that: 13.2.1. Software or computer systems, whether provided by Cantarus or a third-party, cannot be guaranteed to be free of Security Vulnerabilities; 13.2.2. Security Vulnerabilities may present a risk to the performance and security of the Parties’ Software, Confidential Information, Personal Data and other data and content; 13.2.3. for Security Vulnerabilities in third-party Software: 13.2.3.1. Cantarus is dependent on the provision of Security Updates by the relevant third-party Software vendor; 13.2.3.2. the Customer holds Cantarus, its officers, directors, managers, employees and agents harmless for any delay or failure by the third- party software vendor to provide such Security Updates or for any issues related to the efficacy or performance of the third-party Security Updates; 13.2.4. for Security Vulnerabilities in any Cantarus or third-party Software: 13.2.4.1. Cantarus or the third-party Software vendor may require the Customer to have the latest version of the Software installed and operational to receive a Security Update for any given Security Vulnerability; 13.2.4.2. if the latest version of the Software cannot be installed due to reasons outside of Cantarus’ direct control, Cantarus shall use its reasonable endeavours to mitigate the Security Vulnerability where practical to do so. 13.3. Where in Cantarus’ reasonable professional opinion a Security Vulnerability may be of sufficiently high risk to either Party the Customer understands and accepts that: 13.3.1. Cantarus may apply a Security Update or other mitigation without notice to the Customer; and

Related to Security Patching

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Maintenance Programme (i) The Contractor shall prepare a monthly maintenance programme (the “Maintenance Programme”) in consultation with the Authority’s Engineer and submit the same to the Authority’s Engineer not later than 10 (ten) days prior to the commencement of the month in which the Maintenance is to be carried out. For this purpose a joint monthly inspection by the Contractor and the Authority’s Engineer shall be undertaken. The Maintenance Programme shall contain the following:

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!