Security and Monitoring Clause Samples
The Security and Monitoring clause establishes the requirements and responsibilities for maintaining the safety and surveillance of a property or system. It typically outlines the measures that must be implemented, such as installing security cameras, alarm systems, or employing security personnel, and may specify who is responsible for monitoring these systems and responding to incidents. This clause ensures that adequate protections are in place to prevent unauthorized access, theft, or damage, thereby reducing risk and providing peace of mind to all parties involved.
Security and Monitoring. 4.1 Trimble agrees to use commercially reasonable technical and organizational measures designed to prevent unauthorized access, use, alteration or disclosure of the Service or Content, please check our Trust Center in our public web (▇▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/tekla-trust-center). However, Trimble shall have no responsibility for errors in transmission, unauthorized third-party access or other causes beyond ▇▇▇▇▇▇▇’▇ control.
4.2 The Customer expressly acknowledges and agrees that Trimble uses automated and manual tools to monitor the Customer’s use of the Service and the Content, in order to verify the Customer’s compliance with this Agreement and any other agreements in force between Trimble and the Customer, and to detect infringing or otherwise unlawful Content. On becoming aware of any potential breach or violation in such respect, Trimble shall be entitled, at its discretion, to remove such Content and/or terminate this Agreement and/or any Order Form in force between Trimble and the Customer, as set out under clause 8.
Security and Monitoring. Each Member agrees, and undertakes to obtain from time to time such consents and permissions from its Member Agents as may be necessary to ensure, that the LLP may without notice intercept, record and monitor: (a) all communications made by such Member or his Member Agents using the LLP’s information technology or communications systems; and (b) the use by the Member or his Member Agents of the LLP’s information technology systems and network.
Security and Monitoring. FHLBank Atlanta may implement and maintain security measures (including, without limitation, encryption software and firewalls) designed to prevent security breaches with respect to the Services. FHLBank Atlanta may use tools to monitor the technical performance, availability, security and use of the Services, but the existence or non-existence of such tools, and the use or non-use thereof, will not impose any obligation or liability on FHLBank Atlanta.
Security and Monitoring. The Vault maintains 24/7 monitoring of the vault facilities, including a robust security system and regular onsite, armed security. Vault security features dual control and redundant alarm and security devices. All Vault employees undergo screening and background checks, and the vault inventory is subject to accounting controls and regular vault audits. The Vault employes strict procedures regarding vault entry, disbursement, and shipping and receiving.
Security and Monitoring the Reseller shall maintain such security as is necessary to ensure that it complies with its obligations under this Licence and that the Data and any materials incorporating or derived from the Data are kept secure. The Reseller will use its best endeavours to monitor usage of the Data to ensure compliance with this Licence and to ensure that the Data is not released or used in breach of this Licence.
Security and Monitoring. 7.1 Client is responsible for determining whether any materials it wishes to transmit using the ONE Mail Direct Service can appropriately be transmitted using that service given the nature and sensitivity of the materials being transmitted. If Client determines that any additional safeguard is required when transmitting such materials, Client will implement such safeguard.
7.2 eHealth Ontario will monitor the technology infrastructure used to provide the ONE Mail Direct Service in a manner consistent with good network and e-mail service administration practices and in compliance with Applicable Laws.
7.3 eHealth Ontario is not obliged to monitor Client Content, but eHealth Ontario may monitor Client Content when required by law or upon a reasonable belief that Client is breaching or has breached this Agreement.
7.4 In the provision of the ONE Mail Direct Service to Client, eHealth Ontario has the right to take any corrective actions or steps which eHealth Ontario deems necessary, which may include the suspension of the ONE Mail Direct Service, to protect the eHealth Ontario technology infrastructure and eHealth Ontario’s clients from actual or potential threats or security concerns.
Security and Monitoring. Without limiting the Disclaimers set forth in Section 8.3, Contractor will implement reasonable and appropriate measures designed to secure and monitor PPB Content against accidental or unlawful loss, access, or disclosure, including those measures specified in Exhibit II. PPB may identify Content [e.g., medical records subject to HIPAA (the Health Insurance Portability and Accountability Act) and PCI DSS (Payment Card Industry Data Security Standards)] that it reasonably believes requires other or additional security measures. Contractor will take reasonable steps to implement additional security for that Content for an additional fee.
Security and Monitoring. Each Member agrees that the LLP may without notice intercept, record and monitor: (a) all communications made by him using the LLP’s information technology or communications systems; and (b) his use of the LLP’s information technology systems and network.
Security and Monitoring. UIS makes commercially reasonable efforts to enable the secure transfer of data to and from its Servers by using public SSL certificates to offer 256-bit SSL encryption of network services, including SMTP (outbound mail), POP (inbound mail), IMAP (inbound mail and synchronization), LDAP (directory services) and HTTP (web mail, mobile and desktop synchronization). We make commercially reasonable efforts to secure the servers physically by highly restricting and securing server administration, and placing the servers in data centers monitored by live security guards, video surveillance, security code access and individually locked cabinets. The operation of Systems Status may change from time-to-time at UIS' sole discretion.
Security and Monitoring. Client is responsible for determining whether any materials it wishes to transmit using the ONE Mail Direct Service can appropriately be transmitted using that service given the nature and sensitivity of the materials being transmitted. If Client determines that any additional safeguard is required when transmitting such materials, Client will implement such safeguard.