Computer Information Systems Clause Samples

The 'Computer Information Systems' clause defines the rules and responsibilities related to the use, management, and security of computer systems and related technology within an organization or agreement. It typically outlines which systems are covered, who may access them, and the standards for proper use, such as prohibiting unauthorized access or requiring regular software updates. This clause helps ensure that all parties understand their obligations regarding technology resources, thereby reducing the risk of data breaches, misuse, or operational disruptions.
Computer Information Systems. Agent shall be satisfied with Loan Parties’ computer information systems and Loan Parties’ ability to report information to Agent regarding the Collateral and Loan Parties’ financial condition; and
Computer Information Systems. Use the computer information system(s) provided by ADMINISTRATOR for entering and viewing electronic data as required by ADMINISTRATOR. CONTRACTOR shall ensure that CONTRACTOR’s staff understand the uses of the computer information system(s) and will follow the related procedures as evidenced by supervisory reviews and case audits.
Computer Information Systems. 7.3.1 Franchisee shall purchase, use and maintain the Information Systems specified in the Manuals in accordance with the Franchisor’s standards and specifications. The Information Systems must at all time be connected to one or more high-speed communications media specified by Franchisor and be capable of accessing the Internet. Franchisee must electronically link the Information Systems to Franchisor or its designee. Franchisee shall allow Franchisor and/or its designee to access the Information Systems and stored files, and to add, remove, configure and modify information systems via any means including electronic polling and uploads, with or without notice. Franchisor may from time to time upon 30 days advance written notice require Franchisee, at Franchisee’s sole cost and expense, to add, update, upgrade or replace the Information Systems, including hardware and/or software. Although Franchisor cannot estimate the future costs of the Information Systems, required hardware, software, or service or support, and although these costs might not be fully amortizable over the time remaining in the Term, Franchisee agrees to acquire and incur the costs of obtaining and implementing the hardware, software and other components and devices comprising the Information Systems (including additions and modifications) and all support services, service and maintenance agreements and subscriptions prescribed by Franchisor to maintain, protect, and interface with Information Systems. Information Systems may be provided directly by third parties or may be sold, licensed or sublicensed by or through Franchisor at a reasonable one-time or recurring charge, and pursuant to forms of agreement prescribed by Franchisor. 7.3.2 Franchisee shall not use or permit the use of the Information Systems for any unlawful or non-business related activity. Franchisee shall not install or use, and shall prohibit others from installing and using, unauthorized hardware or other components and devices, software on or with the Information Systems. Franchisee shall take all commercially reasonable measures to insure that the Information Systems are used strictly in accordance with Franchisor’s standards, including security protocols and protective measures including how passwords are assigned and rotated, prescribed limitations regarding which persons Franchisee may permit to access (via LAN, WAN, internet or otherwise), use, perform support and installation functions and conduct transactions ...
Computer Information Systems. All courses in the major must be taken for a letter grade. Must maintain a 2.0 GPA in the major. ▇▇▇▇▇▇▇▇ Canyon College course ▇▇▇▇▇▇▇ University Course MATH 180 Analytic Geometry and Calculus MATH 110 Single Variable Calculus MATH 219 Statistics and Probability MATH 203 Introduction to Statistics No response from department CPSC 210 Visual Programming No response from department CPSC 230 Computer Science I No response from department CPSC 231 Computer Science II ACCT 101 Financial Accounting ACTG 210 Introduction to Financial Accounting ACCT 102 Managerial Accounting ACTG 211 Introduction to Managerial Accounting ECON 121 Principles/Micro ECON 200 Principles of Microeconomics ECON 120 Principles/Macro ECON 201 Principles of Macroeconomics All courses in the major must be taken for a letter grade. Must maintain a 2.0 GPA in the major. ▇▇▇▇▇▇▇▇ Canyon College course ▇▇▇▇▇▇▇ University Course MATH 180 Analytic Geometry and Calculus MATH 110 Single Variable Calculus MATH 185 Analytic Geometry and Calculus MATH 111 Single Variable Calculus II MATH 280 Intermediate Calculus MATH 210 Multivariable Calculus MATH 290 Linear Algebra MATH 211 Linear Algebra No response from department CPSC 230 Computer Science I No response from department CPSC 231 Computer Science II ▇▇▇▇▇▇▇▇ Canyon College course ▇▇▇▇▇▇▇ University Course No comparable course PHIL 125 Philosophy of Religion PHIL 108 Ethics PHIL 104 Introduction to Ethics PHIL 111 Introductory Logic PHIL 203 Logic ▇▇▇▇▇▇▇▇ Canyon College course ▇▇▇▇▇▇▇ University Course ▇▇▇▇ 106 Introduction to Philosophy or PHIL 111 Introductory Logic PHIL 101 Introduction to Philosophy OR PHIL 203 Logic PHIL 108 Ethics PHIL 104 Ethics ▇▇▇▇ 112 World Religions REL 115 Living Religions of the World ▇▇▇▇▇▇▇▇ Canyon College course ▇▇▇▇▇▇▇ University Course ▇▇▇▇ 101 Introduction to American Government POSC 110 Introduction to American Politics ▇▇▇▇ 220 International Politics POSC 120 Introduction to International Relations American Politics Area of Study No comparable course ▇▇▇▇ 201 Introduction to Comparative Politics POSC 240 Introduction to Law International Relations Area of Study POSC 221 Comparative Politics All courses in the major must be taken for a letter grade and passed with a C or higher. ▇▇▇▇▇▇▇▇ Canyon College course ▇▇▇▇▇▇▇ University Course PSYC 100 Introduction to Psychology PSY 101 Introduction to Psychology MATH 219 Statistics and Probability PSY 203 Statistics for the Behavioral Sciences PSYC 219 Introduction to...
Computer Information Systems. 7.2.1 Use the computer information system(s) provided by ADMINISTRATOR for entering and viewing electronic data as required by ADMINISTRATOR. CONTRACTOR shall ensure that CONTRACTOR’s staff understand the uses of the computer information system(s) and will follow the related procedures as evidenced by supervisory reviews and case audits. 7.2.2 Inform ADMINISTRATOR within two (2) business days of any employment terminations or new hires in order for ADMINISTRATOR’s Information Technology Services to take appropriate action.
Computer Information Systems. Lender shall be satisfied with Loan Parties’ computer information systems and Loan Parties’ ability to report information to Lender regarding the Collateral and Loan Parties’ financial condition; and

Related to Computer Information Systems

  • Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by ▇▇▇▇▇▇▇, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, ▇▇▇▇▇▇▇ will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Client Information Protected Health Information in any form including without limitation, Electronic Protected Health Information or Unsecured Protected Health Information (herein “PHI”);

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation as Local Traffic under the Interconnection Attachment. 5.2 If a Reconex Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by Reconex, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless Reconex has entered into an arrangement with Verizon to ▇▇▇▇ and collect Voice Information Services provider charges from Reconex’s Customers, Reconex shall pay to Verizon without discount the Voice Information Services provider charges. Reconex shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 Reconex shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event Reconex exercises such option, Reconex will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow Reconex to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless Reconex has entered into an arrangement with Verizon to ▇▇▇▇ and collect Voice Information Services provider charges from Reconex’s Customers, Reconex shall pay to Verizon without discount the Voice Information Services provider charges. Reconex shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.4 Reconex shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from Reconex Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, Reconex shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to ▇▇▇▇ and collect Voice Information Services provider charges from Reconex’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event Reconex exercises such option, Reconex will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow Reconex to route information services traffic originated on its network to Verizon.