Security Assurance Sample Clauses
The Security Assurance clause establishes the obligation for one or both parties to maintain certain standards of data and information security throughout the duration of the agreement. Typically, this clause requires the implementation of technical and organizational measures such as encryption, access controls, and regular security audits to protect sensitive information from unauthorized access or breaches. Its core practical function is to mitigate the risk of data breaches and ensure that both parties are aligned on the expectations for safeguarding confidential or personal data.
POPULAR SAMPLE Copied 2 times
Security Assurance. A. Access to security experts in the event you detect suspicious activity in your network.
Security Assurance. 3.4.1 Project security functions. Contractor undertakes design, construction, completion test, post completion test and ensure the security function of this Project, under this Contract and in subject to administrative regulations of construction engineering and design, administrative regulations of construction engineering quality and relevant law and regulation about safe production.
3.4.2 Safe construction and environment safety on site. Contractor subjects itself to article 7.8 about health, security and environment.
Security Assurance. Give such assurances and do all such things from time to time and at its own cost and expense as required by any applicable Legal Requirement or as the Security Trustee, acting reasonably, considers necessary to enable the Security Trustee to perfect, preserve, or protect any Security or to exercise any of the rights conferred on the Security Trustee.
Security Assurance. A stateThent issued by the coThpetent security authority declaring that classified inforThation at restricted level will be protected according to their national regulations.
Security Assurance. Participant shall maintain software assurance practices that minimize the risk that Participant and its Participant Technology and Partner Applications will introduce Security Vulnerabilities (defined below), including implementing processes and mechanisms (“Security Practices”) for verifying the authenticity and integrity of the software used or distributed by Participant, such as by using public key encryption. Upon request, Participant shall disclose to ServiceNow in reasonable detail its Security Practices (which disclosures shall be Confidential Information of Participant) and shall self-certify to ServiceNow that its Participant Technology and Partner Applications are developed, operated and maintained in accordance with software integrity and security standards developed by ▇▇▇▇▇▇▇▇.▇▇▇ or other similar recognized authority. Participant shall promptly notify ServiceNow in the event that it has knowledge or becomes aware that its Participant Technology or Partner Applications or other implementation, product or service may degrade ServiceNow’s ability to meet its support and service availability terms, or pose a security risk to Customers, the Subscription Service or ServiceNow. Participant agrees to use reasonable efforts to assist ▇▇▇▇▇▇▇▇▇▇, at Participant’s expense, to investigate and resolve any support or availability or security problems that may be caused by a Participant Technology, Participant Services or Partner Applications, in ServiceNow’s discretion.
Security Assurance. At all times, both during the term of this Agreement and after its termination, Brand Influencer will keep in confidence and trust, and will not use or disclose, any Confidential Information without the prior written consent of Company, except (a) as may be necessary in the ordinary course of performing the Services under this Agreement for the benefit of Company, (b) as required by law or legal process, (c) during the course of litigation, so long as the disclosure is restricted in the same manner as the confidential information of other parties, and (d) in confidence to its legal counsel solely in
Security Assurance. A statement issued by the competent security authority declaring that classified information at restricted level will be protected according to their national regulations.
Security Assurance. Findhelp will continue to take appropriate and reasonable measures designed to provide for the security, and availability, of data and information in the Services, including backup and disaster recovery for the systems within the control and responsibility of Findhelp; and, during the term of this agreement (including consecutive renewals), Findhelp will maintain compliance with the requirements for its current HITRUST certification (or equivalent alternative). Findhelp will also keep records of all personnel with such IT systems access and Findhelp shall promptly report any breach of its IT systems or data that relates to Customer or Customer's data that is stored within the Findhelpʼs systems and shall inform Customer of its investigation and mitigation of any such breach. Both parties will take industry standard precautions to protect login information, prevent malicious software transmissions, prevent unauthorized access to the IT systems, prevent access to unauthorized information within the IT systems, timely terminate personnel access when not needed, and other reasonable administrative, technical, and physical safeguards. Each party shall remain responsible for their respective network and/or systems, as well as the configuration of their security settings and controls. Without a mutual written amendment to this Agreement, the Parties agree that Findhelp will not be obligated to complete any additional security assessments or reviews, or be subject to additional testing or inspections or audits (initiated by or on behalf of Customer) while such HiTRUST certification is consistently maintained by Findhelp. Upon request by Customer, Findhelp will provide the most current completed third-party assessment related to such HiTRUST certification to Customer.
Security Assurance. A statement issued by the competent security authority declaring that classified information at RISERVATO level will be protected physicaly at the level of RISERVATIS SIMO/Stg.CONFIDENTIEEL.
Security Assurance. Supplier shall maintain a Risk Assessment Process which demonstrates the Security Assurance of Supplier’s Software and Hardware. This Process shall include, but is not limited to:
6.1. Supplier must, at Verizon’s cost, coordinate and conduct a Risk Assessment of its Software and Hardware using a Certified Verizon third-party security testing vendor. This Risk Assessment must be completed sixty (60) days prior to the initial delivery of Supplier Software and Hardware, respectively or as otherwise agreed upon by the Parties in writing. Supplier shall thereafter, at Verizon’s cost and discretion, repeat this Risk Assessment at the earlier of (1) every major version release or (2) annually for all Software and Hardware deployed in the Verizon network or hosted by Supplier. This Risk Assessment shall include the following:
6.1.1. A Threat Analysis of the Software and Hardware
6.1.2. A Penetration Test of the Software and Hardware
6.1.3. A Risk Assessment of the administrative, technical, logical and physical security controls of the pertinent operating environment, systems, networks, and facilities where Software and Hardware is hosted, if hosted by Supplier.
6.2. Supplier must resolve all high and medium risk Vulnerabilities identified in the Risk Assessment Process prior to production release except as otherwise specified by Verizon in writing. At Verizon request, Supplier shall provide to Application Service Provider Agreement - Synchronoss and Verizon Proprietary and Confidential Verizon a documented resolution timeline thirty (30) days before production release for all remaining Vulnerabilities to be remediated post production. This document shall include the date by which each Vulnerability will be remediated.
6.3. Verizon may request a copy of the scope of work from the above third-party Risk Assessment Process (Section 6.1). Supplier shall deliver this document to Verizon within two (2) business days of the initial request.