Systems Security. (a) If any Party or its Personnel are given access to any computer systems or software of any member of the other Party’s Group (“Systems”) in connection with such Party’s performance or receipt of Transition Services, such Party shall comply, and shall cause the other members of its Group and its Personnel to comply, with all of such other Party’s system security policies, procedures and requirements (as amended from time to time, the “Security Regulations”), and will not tamper with, compromise or circumvent any security or audit measures employed by such other Party.
Systems Security. (a) If Rank, the Company, their Affiliates or their respective Personnel receive access to any of Rank’s, the Company’s, or their respective Affiliates’, as applicable, Systems in connection with the Services, the accessing Party or its Personnel, as the case may be, shall comply with all of such other Party’s and its Affiliates’ reasonable Security Regulations known to such accessing Party or its Personnel or made known to such accessing Party or its Personnel in writing, and will not tamper with, compromise or circumvent any security, Security Regulations or audit measures employed by such other Party or its relevant Affiliate.
Systems Security. Insurer shall maintain policies, procedures and practices related to system security and integrity that are in line with national industry standards and best practices. Insurer shall regularly, no less frequently than annually, review and update its policies, procedures and practices for the following areas:
Systems Security a) Vendor must document and maintain adequate:
Systems Security. If the Company shall receive access to any of the Providers’ computer facilities, system(s), networks (voice or data) or software (“Systems”) in connection with performance of the Services, the Company shall comply with all system security policies, procedures and requirements that may be provided by either Provider to the Company in writing from time to time (the “Security Regulations”) and shall not tamper with, compromise or circumvent any security or audit measures employed by the Providers. Any employee of the Company or any of its Subsidiaries or Affiliates that is expected to have access to the Providers’ Systems may be required to execute a separate system access agreement. The Company shall ensure that only such users who are specifically authorized to gain access to the Providers’ Systems will gain such access and shall prevent unauthorized destruction, alteration or loss of information contained therein. If at any time either Provider determines that any personnel of the Company of any of its Subsidiaries or Affiliates has sought to circumvent or has circumvented the Providers’ Security Regulations or that an unauthorized person has accessed or may access the Providers’ Systems or a person has engaged in activities that led or may lead to the unauthorized access, destruction or alteration or loss of data, information or software, such Provider may immediately terminate any such person’s access to the Systems and shall promptly notify the Company. In addition, a material failure to comply with the Providers’ Security Regulations shall be a breach of this Agreement, in which case, the Providers shall notify the Company and such Parties shall work together to rectify said breach. If the Parties do not rectify the breach within thirty (30) days from its occurrence, the Providers shall be entitled to immediately terminate the Services to which the breach relates.
Systems Security. (a) If either Party or any of its respective Subsidiaries (such Party together with its Subsidiaries, the “Accessing Party”) is given access to the computer system(s), facilities, networks (including voice or data networks) or software (collectively, “Systems”) used by the other Party or any of the other Party’s Subsidiaries (such other Party and its Subsidiaries, the “Disclosing Party”) in connection with the provision of the Services, the Accessing Party shall comply with the Disclosing Party’s security regulations, which shall be provided by the Disclosing Party prior to access to the Systems. The Accessing Party will not tamper with, compromise or circumvent any security or audit measures employed by the Disclosing Party. The Accessing Party shall (i) ensure that only those users who are specifically authorized to gain access to the other’s Systems gain such access and (ii) prevent unauthorized destruction, alteration or loss of information contained therein. If at any time the Disclosing Party determines that any personnel of the Accessing Party has sought to circumvent or has circumvented the Disclosing Party’s security regulations or other security or audit measures or that an unauthorized person has accessed or may access the Disclosing Party’s Systems or a person has engaged in activities that may lead to the unauthorized access, destruction or alteration or loss of data, information or software, the Disclosing Party may immediately terminate any such person’s access to the Systems and, if such person’s access is terminated, shall immediately notify the Accessing Party. In addition, a material failure to comply with the Disclosing Party’s security regulations shall be a breach of this Agreement, and the Parties shall work together to rectify any such failure to comply with the Disclosing Party’s security regulations. If any breach of the Disclosing Party’s security regulations is not rectified within ten days following its occurrence, the Disclosing Party shall be entitled to immediately terminate the Services to which the breach relates or, if it relates to all the Services that the Disclosing Party receives or provides, as applicable, the non-breaching Party shall be entitled to immediately terminate the Agreement in its entirety.
Systems Security. (a) If the Provider, Purchaser, their Affiliates or their respective Personnel receive access to any of the Provider’s, Purchaser’s or their respective Affiliates’, as applicable, computer systems or software (“Systems”) in connection with the Transition Services, the accessing party or its Personnel, as the case may be, shall comply with all of such other party’s and its Affiliates’ Security Regulations as have been provided in writing to the other party, and will not tamper with, compromise or circumvent any security or audit measures employed by such other party.
Systems Security. Xxxxx Xxxxxxxx, Acting Director Division of Compliance and Assessments Office of Information Security Office of Systems Social Security Administration 3829 Annex Building 0000 Xxxxxxxx Xxxxxxxxx Xxxxxxxxx, XX 00000 Telephone: (000) 000-0000 Email: xxxxxx.xxxxxxxx@xxx.xxx Matching Agreement Xxxxxxx Xxxxx, Government Information Specialist Office of Privacy and Disclosure Office of the General Counsel 6401 Security Boulevard, 000 Xxxxxxxx Xxxxxxxx Baltimore, MD 00000-0000 Telephone: (000) 000-0000 Email: Xxxxxxx.Xxxxx@xxx.xxx Project Coordinator Xxxx Xxxx Office of Data Exchange Office of Data Exchange and Policy Publications 0000 Xxxxxxxx Xxxxxxxxx, 3-G-9-B Xxxxx Xxxxxxxx Xxxxxxxxx, XX 00000-0000 Telephone: (000) 000-0000 Email: Xxxx.Xxxx@xxx.xxx
Systems Security. (a) The parties hereto acknowledge that personnel of each party or such party’s Affiliates (the “Accessing Party”), as the case may be, will be given access to the other parties’ or its Affiliates’ (the “Granting Party”) information technology systems, information technology, platforms, networks, applications, software, software databases or computer hardware (“Systems”) in connection with the provision or receipt of the Services, in which there is no commercially practical method to partition or separate portions of the Systems or restrict the access of the personnel of the Accessing Party in connection with the Services. Accordingly, the Accessing Party shall comply with all of the Granting Party’s system security policies, procedures and requirements (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by the Granting Party or any of its Affiliates. Each Accessing Party shall ensure that its personnel accessing the Granting Party’s Systems are made aware of the restrictions set forth in this Agreement and the Security Regulations prior to connecting to the Granting Party’s Systems.
Systems Security. (a) If a Recipient Party, its Affiliates, any of their respective personnel or any personnel of any third party retained by such Party or its Affiliates and any authorized agent, auditor or Governmental Authority (collectively, the “Recipient Party Personnel”) is given access by a Performing Party or its Affiliates to: (i) information systems, including any computer systems or software and data stored therein, of the Performing Party or its Affiliates or (collectively, the “Performing Party Systems”), the Recipient Party Personnel shall comply with all of such Performing Party's and its Affiliates' information system security policies, procedures and requirements applicable in accessing and using the Performing Party Systems, and shall not tamper with, compromise or circumvent any security or audit measures employed by such Performing Party or its Affiliates.