IT Security Sample Clauses

IT Security. Development and implementation of management, operational, and technical security controls required by agencies to assure desired levels of protection for IT systems and data are achieved (e.g., establishment of policy/procedures in support of Federal IT security requirements, conduct risk assessments to identify threats/vulnerabilities for existing/planned systems; support Federal mandates for measuring and reporting compliance, perform certification and accreditation (C&A) activities; provide training services to promote awareness and knowledge of compliance responsibilities for Federal IT security requirements).
AutoNDA by SimpleDocs
IT Security. (a) Contractor has an information security program to maintain physical, technical, administrative, and organizational safeguards that comply with:
IT Security. Whinstone will install a firewall and implement an IT security policy to prevent unauthorized access physically or remotely, viruses and ransomware. However, the Customer shall have the right to install its own firewall and implement its own security policies in the place of or in addition to Whinstone as mutually agreed to by both parties.
IT Security. (a) Service Recipient shall cause all of its personnel, employees, officers, contractors, consultants or other agents (collectively, the “Recipient Personnel”) having access to the Provider Systems to comply with all documented security guidelines applicable to Service Provider’s and its Subsidiaries’ personnel, employees, officers, contractors, consultants or other agents generally (including physical security, network access, data security and privacy guidelines and similar policies) of Service Provider and shall not knowingly tamper with, compromise or circumvent any security or audit measures employed by Service Provider. Service Recipient shall ensure that such access shall be made by such Recipient Personnel only as required in connection with, or as specifically contemplated by, the performance, delivery or receipt of a Service hereunder.
IT Security. The Supplier shall: ❑ Ensure it is and remains aware of the Client’s IT Security Policy, guidelines and protocols, and, or; ❑ Comply with the Client’s IT Security Policy, guidelines and protocols issued by the Client from time to time when accessing or using the Client’s IT Systems (which it may only do with the consent of the Client) and, or; ❑ Not connect any of its/their IT equipment to the Client’s Systems, not make any unauthorised adaptations to the Client’s Systems without written authorisation from the Client, and; ❑ Not download any unlicensed software onto the Client’s Systems, and; ❑ Not use the Client’s Systems for anything other than the provision of Services pursuant to this Agreement, and; ❑ Take all reasonable precautions in accordance with Best Industry Practice to avoid introducing any Viruses into the Client’s Systems or otherwise corrupting the Client’s (or its clients’) data, and shall indemnify ARC for all Losses incurred by ARC and/or the Client arising out of the Supplier’s failure to comply with its obligations related to IT security stated in this Agreement or any deliberate or negligent act or omission of the Supplier or its Consultants that introduces a Virus into the Client’s Systems or corrupts the Client’s (or its clients’) data.
IT Security. Note: IT Security This should be considered in conjunction with the definition of IT Security Management System. Depending on the nature of the Data and the technical sharing arrangements, the parties may wish to specify further in this Clause how the Data must be kept secure. If the parties include technical specifications, IT security, mandatory security policies or other schedules or annexes, these should be considered in conjunction with Clause 1.2 (Interpretation). The parties each undertake to implement and, during the Term, continuously operate an IT Security Management System. If the Data Consumer becomes aware of any misuse of any Data, or any security breach in connection with this Agreement that could compromise the security or integrity of the Data or otherwise adversely affect the Data Provider, the Data Consumer shall, at the Data Consumer's expense, promptly notify the Data Provider and fully co-operate with the Data Provider to remedy the issue as soon as reasonably practicable. Confidentiality
IT Security. 16.1 The Manager shall maintain appropriate IT security in line with industry standards and if necessary comply with any Company IT Security Policy, the details of which shall be made available to the Manager including any revisions or updates.
AutoNDA by SimpleDocs
IT Security. 15.1. PLATIT equipment can be connected to the internet for the purpose of remote diagnostics and data analysis. It is recommended to connect the equipment only during the time of remote diagnostics to the internet. The customer is responsible for protecting the operating system of the PLATIT equipment and the network through which the PLATIT equipment is connected to the internet against cyber-attacks (e.g., malicious software, hacks, encryptions, data loss). PLATIT excludes liability for damages and consequential damages in connection with cyber-attacks. In addition to online accessibility, PLATIT equipment provides ports to load data onto the units (e.g., USB-stick). It is the customer's duty to ensure that data transferred via such media is free of malicious software and compatible with the operating system and PLATIT software installed on the PLATIT system.
IT Security a. The Supplier shall, at its own cost and expense, implement and maintain, appropriate technical and organisational measures to ensure a level of security:
Time is Money Join Law Insider Premium to draft better contracts faster.