Xxxxxxx’s Role and Responsibilities. A. Covered Data is and shall remain the property of Grantee. B. Grantee is solely responsible for its Access to and use of Software Entitlements and Covered Data, including: 1. Ensuring a level of security appropriate to the risk in respect of Covered Data; 2. Securing Grantee’s and its Authorized Users’ systems and devices that can Access FL[DS] systems and Software Entitlements and complying with the Security Standards; 3. Selecting and/or ensuring that Grantee has selected its Authorized Users; activating and deactivating the Access, credentials, and privileges of its Authorized Users; and managing access controls to the FL[DS] system and Software Entitlements in a timely manner in accordance with the Security Standards; 4. Securing the account authentication credentials, systems, and devices of Grantee personnel who the Grantee designates to be Authorized Users; 5. Managing the compliance of its Authorized Users with the Grantee’s established security measures and as required by Applicable Law; 6. Maintaining audit logs, as deemed necessary by the Grantee to demonstrate compliance with its obligations under this DSA; 7. Backing up Covered Data, if required by law or Grantee policy; and 8. Ensuring that it and its Authorized Users remain in compliance with the terms and conditions of any Software Entitlements. C. FL[DS] is not responsible for, and has no obligation for: 1. Selecting or verifying Xxxxxxx’s Authorized Users, activating or deactivating the Access or credentials of Authorized Users; or 2. Protecting Covered Data that Grantee elects to store or transfer outside of FL[DS]’s and its sub-processors’ systems (for example, offline or on-premises storage).
Appears in 3 contracts
Samples: Grant Agreement, Grant Agreement, Grant Agreement
Xxxxxxx’s Role and Responsibilities. A. Covered Data is and shall remain the property of Grantee.
B. A. Grantee is solely responsible for its Access to and use of Software Entitlements and Covered Data, including:
1. Ensuring a level of security appropriate to the risk in respect of Covered Data;
2. Securing Grantee’s and its Authorized Users’ systems and devices that can Access FL[DS] systems and Software Entitlements and complying with the Security Standards;
3. Selecting and/or ensuring that Grantee has selected its Authorized Users; activating and deactivating the Access, credentials, and privileges of its Authorized Users; and managing access controls to the FL[DS] system and Software Entitlements in a timely manner in accordance with the Security Standards;
4. Securing the account authentication credentials, systems, and devices of Grantee personnel who the Grantee designates to be Authorized Users;
5. Managing the compliance of its Authorized Users with the Grantee’s established security measures and as required by Applicable Law;
6. Maintaining audit logs, as deemed necessary by the Grantee to demonstrate compliance with its obligations under this DSA;
7. Backing up Covered Data, if required by law or Grantee policy; and
8. Ensuring that it and its Authorized Users remain in compliance with the terms and conditions of any Software Entitlements.
C. B. FL[DS] is not responsible for, and has no obligation for:
1. Selecting or verifying Xxxxxxx’s Authorized Users, activating or deactivating the Access or credentials of Authorized Users; or
2. Protecting Covered Data that Grantee elects to store or transfer outside of FL[DS]’s and its sub-processors’ systems (for example, offline or on-premises storage).
Appears in 2 contracts
Samples: Grant Agreement, Grant Agreement
Xxxxxxx’s Role and Responsibilities. A. Covered Data is and shall remain the property of Grantee.
B. Grantee is solely responsible for its Access to and use of Software Entitlements and Covered Data, including:
1. Ensuring a level of security appropriate to the risk in respect of Covered Data;
2. Securing Grantee’s and its Authorized Users’ systems and devices that can Access FL[DS] systems and Software Entitlements and complying with the Security Standards;
3. Selecting and/or ensuring that Grantee has selected its Authorized Users; activating and deactivating the Access, credentials, and privileges of its Authorized Users; and managing access controls to the FL[DS] system and Software Entitlements in a timely manner in accordance with the Security Standards;
4. Securing the account authentication credentials, systems, and devices of Grantee personnel who the Grantee designates to be Authorized Users;
5. Managing the compliance of its Authorized Users with the Grantee’s established security measures and as required by Applicable Law;
6. Maintaining audit logs, as deemed necessary by the Grantee to demonstrate compliance with its obligations under this DSA;
7. Backing up Covered Data, if required by law or Grantee policy; and
8. Ensuring that it and its Authorized Users remain in compliance with the terms and conditions of any Software Entitlements.
C. FL[DS] is not responsible for, and has no obligation for:
1. Selecting or verifying Xxxxxxx’s Authorized Users, activating or deactivating the Access or credentials of Authorized Users; or
2. Protecting Covered Data that Grantee elects to store or transfer outside of FL[DS]’s and its sub-processors’ systems (for example, offline or on-premises storage).
Appears in 1 contract
Samples: Grant Agreement