Vendor Security Sample Clauses

Vendor Security. Third party service providers whose services involve access to any confidential information must agree contractually to data privacy and security commitments commensurate with their access and handling of confidential information.
AutoNDA by SimpleDocs
Vendor Security. Third party service providers whose services involve access to any confidential information must agree contractually to data privacy and security commitments commensurate with their access and handling of confidential information. The SharpSpring Privacy Policy includes provisions related to the sharing of data with third party service providers and their obligations to maintain the confidentiality of that data. Physical security controls in all data centers utilized by the SharpSpring SaaS infrastructure include protection of facility perimeters using various access control measures, including biometric identification, supervised entry, 24/7/365 on-premise security teams, CCTV systems. Access to data centers is limited to authorized employees or contractors only. Controls are in place to protect against environmental hazards at all data centers. All data center facilities have successfully been attested to SSAE 18, SOC 2 type 2, ISO 27001, or similar requirements. The operation of systems and applications that support the Service is subject to documented operating procedures. The System Administration team maintains standard server configurations. Separate environments are maintained to allow for the testing of changes. Third-party access to SharpSpring systems is regularly audited. The organization maintains documented backup procedures. Full backups are performed regularly for all production databases. Data backups are transferred to an offsite location on a regular schedule and are stored encrypted. The physical disk arrays, which host the data, use a cipher of AES256 to store the data encrypted at rest. All systems and network devices are synchronized to a reliable and accurate time source via the “Network Time Protocol” (NTP). All high priority event-alerting tools escalate into notifications for SharpSpring’s 24x7 incident response team, providing the System Administration team with alerts, as needed. SharpSpring maintains an “Acceptable Use” policy that outlines requirements for the use of user IDs and passwords. The organization publishes and maintains a password management standard. In general, users are asked to follow the strong password policies. Strong authentication practices (e.g., SSH keys, 2FA, IP-based restrictions) are used to control access to production and development environments. Direct access to the “root” account on all production servers is restricted to Software Engineering and System Administration personnel as deemed necessar...

Related to Vendor Security

  • Predecessor Security The term “

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid. 2.1.1 Bid security, if required, shall be in the amount specified on the bid. The bid security must be scanned and attached to the “Response Attachments” section of your response or it can be faxed to the Purchasing Office at 000-000-0000. The original bid security should then be sent or delivered to the office of the Purchasing Division, 000 X. 0xx Xx., Xxx. 000, Xxxxxxx, XX 00000 to be received within three (3) days of bid closing. 2.1.2 If bid security is not received in the Office of the Purchasing Division as stated above, the vendor may be determined to be non-responsive. 2.2 If alternates are submitted, only one bid security will be required, provided the bid security is based on the amount of the highest gross bid. 2.3 Such bid security will be returned to the unsuccessful Bidders when the award of bid is made. 2.4 Bid security will be returned to the successful Bidder(s) as follows: 2.4.1 For single order bids with specified quantities: upon the delivery of all equipment or merchandise, and upon final acceptance by the Owners. 2.4.2 For all other contracts: upon approval by the Owners of the executed contract and bonds. 2.5 Owners shall have the right to retain the bid security of Bidders to whom an award is being considered until either: 2.5.1 A contract has been executed and bonds have been furnished. 2.5.2 The specified time has elapsed so that the bids may be withdrawn. 2.5.3 All bids have been rejected. 2.6 Bid security will be forfeited to the Owners as full liquidated damages, but not as a penalty, for any of the following reasons, as pertains to this specification document: 2.6.1 If the Bidder fails or refuses to enter into a contract on forms provided by the Owners, and/or if the Bidder fails to provide sufficient bonds or insurance within the time period as established in this specification document.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!