Common use of Security Acknowledgement Clause in Contracts

Security Acknowledgement. Certain portions of Products are designed to identify, block and/or remove applications, messages, and files that may compromise productivity or performance and security of computers, systems, and/or networks. While Trend Micro uses commercially reasonable efforts to properly identify applications and files for detection by its Products, given the constantly changing nature and volume of malicious, fraudulent, and unwanted electronic content, Trend Micro cannot and does not represent, warrant, or guarantee that a Product will detect, identify, block, or completely remove, clean, remediate, or resolve any or all applications, routines, and files that are malicious, fraudulent, or other unwanted intrusions nor does it guarantee that data transmission by Company over the internet is secured by Trend Micro. Trend Micro is not responsible for any interception or interruption of any communications through the internet or networks or systems outside Trend Micro’s control. Company understands and agrees that the success of its security efforts is dependent on a number of factors solely under Company’s control and responsibility such as: (a) use of network, hardware, software, cloud services, and software security tools in a coordinated effort to manage present and future security threats; (b) implementation of cybersecurity protocols and controls, network, cloud services, software and systems protections, as well as applicable monitoring and detection processes; (c) enforcement of appropriate internal security policies, procedures, and controls regarding access, security, encryption, use, and transmission of data; (d) the development and continual testing of applicable processes and procedures for (i) the backup and recovery of any network, system, software, database, and any stored data, and (ii) implementation of security-breach incident response practices; (e) conducting regular cybersecurity and privacy training for employees as well as any other relevant personnel; (f) having adequate vendor risk management processes; and (g) promptly downloading and installing updates to all networks, products, and software that are made available to Company by any of its third party vendors.

Appears in 2 contracts

Sources: Global Products Agreement, Global Products Agreement