Computer System Security Sample Clauses

Computer System Security. Company agrees to maintain and regularly update the security of its computer software, hardware network or system or Wireless Devices ("Computer System"), through which Company, Administrators or Users access the Services, including, without limitation, by installing, maintaining and regularly updating anti-virus and antispyware identification and removal software and other deterrent systems reasonably necessary to prevent unauthorized access to Company's Computer System. Company agrees to take reasonable precautions to prevent the introduction of any disabling procedures, including but not limited to, software lock, malicious logic, worm, Trojan horse, bug, or time bomb) into Software that might disrupt Equipment or Software, or the equipment or software of other Users of the Services. CHECK SERVICES CHECK POSITIVE PAY‌
Computer System Security. (1) The Bonded Web User shall place network and system devices used in the Bonded Web User Program and DMV interface in secure areas. The Bonded Web User shall control access to these devices and shall limit access to, and viewing of (if appropriate), these devices to individuals that have completed and signed an Information Security and Disclosure Statement, Public and Private Partnerships Employee form submitted during the application process for participation in the Bonded Web User Program. (2) Workstations and printers utilized to access the DMV’s IRP vehicle registration and inventory databases and display or print DMV records shall be located within the Bonded Web User’s site or facility in such a manner that displayed or printed records are not visible or accessible to unauthorized employees or the general public. (3) Workstations and printers utilized to access the DMV’s IRP vehicle registration and inventory databases and display or print DMV records, shall be secured to the business site or facility by means of a security cabling system, or physically affixing the workstation or printer to an enclosure or fixture/furniture located within the business site or facility. (4) Workstations displaying DMV records or the DMV’s IRP vehicle registration and inventory databases information shall display an electronic “admonishment warning banner” to the user at the time of access initiation. The banner shall contain the following language: “WARNING: Unauthorized access or misuse of data may result in disciplinary action, civil penalties and/or criminal prosecution.” (5) Workstations shall not be left unattended while accessing the DMV’s IRP vehicle registration and inventory databases. Workstations shall be configured to either programmatically end access or invoke a display obfuscation screen after a maximum of ten (10) continuous minutes of inactivity. Once access has ended or the display screen has been obfuscated, the user shall be required to re-authenticate to the authentication credentialing system prior to re-establishing access or un-obscuring the display.

Related to Computer System Security

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • Provisional Interconnection Service Prior to the completion of the Large Facility Interconnection Procedures and prior to completion of requisite Attachment Facilities, Distribution Upgrades, System Upgrade Facilities, System Distribution Upgrades, or System Protection Facilities, the Developer may request an evaluation for Provisional Interconnection Service. NYISO, in conjunction with the Connecting Transmission Owner, shall determine, through available studies or additional studies as necessary, whether stability, short circuit, thermal, and/or voltage issues would arise if the Developer interconnects without modifications to the Large Generating Facility or the New York State Transmission System (or Distribution System as applicable). NYISO, in conjunction with the Connecting Transmission Owner, shall determine whether any Attachment Facilities, Distribution Upgrades, System Upgrade Facilities, System Deliverability Upgrades, or System Protection Facilities, which are necessary to meet Applicable Laws and Regulations, Applicable Reliability Standards, and Good Utility Practice, are in place prior to the commencement of interconnection service from the Large Facility. Where available studies indicate that the Attachment Facilities, Distribution Upgrades, System Upgrade Facilities, System Deliverability Upgrades, or System Protection Facilities are required for the interconnection of a new, modified and/or expanded Large Facility but such facilities are not currently in place, NYISO, in conjunction with the Connecting Transmission Owner, will perform a study, at the Developer’s expense, to confirm the facilities that are required for Provisional Interconnection Service. The maximum permissible output of the Large Facility in the Provisional Large Facility Interconnection Agreement shall be studied, at the Developer’s expense, and updated annually. The NYISO shall issue the study’s findings in writing to the Developer and Connecting Transmission Owner(s). Following a determination by NYISO, in conjunction with the Connecting Transmission Owner, that the Developer may reliably provide Provisional Interconnection Service, NYISO shall tender to the Developer and Connecting Transmission Owner, a Provisional Large Facility Interconnection Agreement. NYISO, Developer, and Connecting Transmission Owner may execute the Provisional Large Facility Interconnection Agreement, or the Developer may request the filing of an unexecuted Provisional Large Facility Interconnection Agreement with the Commission. The Developer shall assume all risk and liabilities with respect to changes between the Provisional Large Facility Interconnection Agreement and the Large Generator Interconnection Agreement, including changes in output limits and the cost responsibilities for the Attachment Facilities, System Upgrade Facilities, System Deliverability Upgrades, and/or System Protection Facilities.