Information System Security Sample Clauses

The Information System Security clause establishes requirements and standards for protecting the confidentiality, integrity, and availability of information systems used in the course of a contract or business relationship. It typically outlines the security measures that must be implemented, such as access controls, encryption, regular security assessments, and incident response protocols, and may apply to both hardware and software systems as well as data storage and transmission. The core function of this clause is to mitigate the risk of data breaches, unauthorized access, and other cyber threats, thereby ensuring that sensitive information remains secure throughout the duration of the agreement.
Information System Security. The Contractor shall protect and maintain all confidential information gained by reason of this contract against unauthorized use, access, disclosure, modification or loss. Personal and/or medical information collected, used or acquired in connection with this contract shall be used solely for the purposes of this contract.
Information System Security. Both Parties shall protect and maintain all confidential information gained by reason of this MOU against unauthorized use, access, disclosure, modification or loss. Personal and/or medical information collected, used or acquired in connection with this MOU shall be used solely for the purposes of this MOU.
Information System Security. LEDC shall protect and maintain all confidential information gained by reason of this contract against unauthorized use, access, disclosure, modification or loss. Personal and/or medical information collected, used or acquired in connection with this contract shall be used solely for the purposes of this contract.
Information System Security. The Undersigned and the Bank shall ensure the security of the information system used respectively in order to prevent any illegal intrusion, access, modification, destruction of business records or personal data of the Undersigned. The Bank shall bear the burden of proof for the non-existence of any disputes over any third party’s cracking into the protective measures of the Bank's information system or taking advantage of the leaks in such information system. The Bank shall bear the liability for any damage to the Undersigned caused by a third party intruding into the Bank’s information system.
Information System Security. Contracting Party shall assure the security of the information system to prevent illegal intrusion, access, modification, damage of the business record or the information of the Contracting Party. It is not the responsibility of the Bank to provide evidence on the controversy over the penetration of the security protection of the information system of the Bank or using the loophole of the information system by a third party. The Bank shall be responsible for the damage to the Contracting Party caused by the intrusion of a third party into the information system of the Bank.
Information System Security. Information security is the protection of information systems and information against unauthorized access, use modification or disclosure – ensuring confidentiality, integrity and availability of information systems and information. Where applicable the CERTNA will provide a level of security and information integrity equal to or exceeding industry best practices as defined in National Institute of Standards and Technology (NIST) Special Publication 800 Series, ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/PubsSPs.html and comply with all state and federal laws.
Information System Security. The Contractor shall act as a temporary point-of-contact in the absence of the Federal IAO/NTR Information Assurance Officer/Network Technical Representative (IAO/NTR). The Contractor shall, at a minimum, perform the following security administration tasks:  User support: a. Recommend to the Federal IAO/NTR and, as needed, nominating qualified network users for approval by the NRL Security Networking Group. b. Ensuring SSD IT users have access to the network, only after approval by the NRL Code 1220. c. Training new SSD IT users on the proper operating and security procedures. d. Ensuring departed users accounts are secured and closed according to NRL directives and policies. e. Ensure appropriate vetting process, training and forms are completed according to the type of SSD IT account needed (i.e., contractor, Federal Employee, Collaborator, Foreign National, etc.)  SSD IT systems support: a. Ensuring that approved configurations of connected systems are maintained and that configuration changes are approved by the NRL Security Networking Group before implementation. b. Using Shavlik HFNetChk and windows group policies, ensuring that the Division desktop and portable IT systems and the SSD shared computer systems and infrastructure meet DoD and DoN security standards, and reporting completed IAVA/B’s to the SSD NTR or NRL Security Networking Group or both in accordance with technical direction. c. Notifying the COR, the Federal IAO/NTR, and the NRL Security Networking Group of security violations or suspicious activities pertaining to the SSD computer systems, servers and the SSD shared computer systems and infrastructure.
Information System Security. Bank SinoPac and the Client shall ensure the security of the information systems they use to prevent unauthorized access to, acquisition of, tampering with, or destruction of business records or the Client’s personal data. In the event that a third party breaches the protection measures of Bank SinoPac’s information system or exploits a vulnerability in Bank SinoPac’s information system, Bank SinoPac shall bear the burden of proof for the non-existence of such fact. Bank SinoPac shall be liable for any damage to the Client by a third party’s hacking into Bank SinoPac’s information system.
Information System Security. School ICT system security will be reviewed regularly by the school’s IT management operators. Virus protection will be installed and updated regularly. Security strategies will be discussed, where necessary, with the school’s governing body.
Information System Security. I. The Bank and the Applicant shall ensure the security of their respective information system in use to prevent illegal access, acquisition, tampering, and damage to business records or personal data of the Applicant. II. When a third party breaks the protection measures of the Bank’s information system or exploits a loophole in the Bank’s information system, the Bank is obliged to prove that such accusation is non existent. III. The Bank is liable for compensating the customers for any damage resulted from a third party’s intruding the Bank’s information system.