Computer Network Security Sample Clauses

The Computer & Network Security clause establishes requirements and standards for protecting computer systems and networks from unauthorized access, breaches, or other security threats. Typically, this clause obligates parties to implement appropriate technical and organizational measures, such as firewalls, encryption, and regular security assessments, to safeguard sensitive data and maintain system integrity. Its core function is to mitigate the risk of data breaches and cyberattacks, ensuring that both parties uphold a baseline level of security to protect confidential information and maintain trust.
Computer Network Security. NetWitness shall use commercially reasonable efforts to carry out the following procedures to protect Customer’s Content:
Computer Network Security. The purpose of Computer/Network security is to ------------------------- impede potential information flow between the InterTrust Technology Group and the Active Key Group by limiting access to electronic information. The Computer/Network Security procedures shall comprise, at a minimum, the following: (a) no portable storage media (such as floppy disks, Mo, etc.) shall be passed between members of the InterTrust and Active Key groups whether or not such media is thought to contain confidential information of either group; (b) no member of the Active Key Group, or any MBC or third party technical personnel, shall have access to the InterTrust Technology Group=s network resources, including file storage, printing, communications, and other host or server resources; (c) any server resources of the InterTrust Technology Group must be protected against unauthorized access, at a minimum through the use of individual user passwords; and (d) no InterTrust Top Secret Information shall be stored on a server (unless such server is used solely in connection with the InterTrust Technologies Group), or other storage media shared by persons not in the InterTrust Technology Group, and no such InterTrust Top Secret Information shall be included in any e-mail and other electronic communications between members of the InterTrust Technology Group passing through any host or server to which any member of the Active Key Group has any access rights. With respect to Chinese Wall Information other than Top Secret Information, all e-mail and other electronic communication between members of the InterTrust Technology Group containing any such information shall not pass through any host or server to which any member of the defined Key Group has any access rights which enables users to access information as an administrator.
Computer Network Security. The purpose of Computer/Network security is to ------------------------- impede potential information flow between the InterTrust Technology Group and the Active Key Group by limiting access to electronic information. The Computer/Network Security procedures shall comprise, at a minimum, the following:
Computer Network Security. The Insurer shall pay on behalf of the Insured all sums in excess of the deductible that the Insured becomes legally obligated to pay as Damages as a result of a Claim first made against the Insured and reported in writing to the Insurer during the Policy Period or within sixty (60) days thereafter, by reason of any Wrongful Act arising out of Professional Services rendered or that should have been rendered by the Insured, provided that such Wrongful Act occurs on or after the Retroactive Date and before the end of the Policy Period and that results in: 1. the inability of a third party, who is authorized to do so, to gain access to Computer Systems; 2. the failure to prevent Unauthorized Access to Computer Systems that results in: a. the destruction, deletion, or corruption of electronic data on Computer Systems; b. Theft Of Data from Computer Systems; or c. denial of service attacks against Internet sites or computers; or 3. the failure to prevent transmission of Malicious Code from Computer Systems to third party computers and systems. However, notwithstanding any other provisions above, coverage hereunder excludes first party claims made by the Insured.
Computer Network Security. RSA shall use commercially reasonable efforts to carry out the following procedures to protect Customer Content:
Computer Network Security 

Related to Computer Network Security

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Network Services Preventive care: 100% coverage. Preventive services include, but are not restricted to routine physical exams, routine gynecological exams, routine hearing exams, routine eye exams, and immunizations. A $100 single and $200 family combined annual deductible will apply to lab/diagnostic testing after which 100% coverage will apply. A $50 copay will apply to CT and MRI scans.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.