Security of System Files Clause Samples

The 'Security of System Files' clause establishes requirements and responsibilities for protecting critical system files from unauthorized access, alteration, or destruction. Typically, this clause mandates the implementation of technical safeguards such as access controls, encryption, and regular monitoring to ensure only authorized personnel can interact with sensitive files. By setting these standards, the clause helps prevent data breaches, system compromise, and operational disruptions, thereby safeguarding the integrity and reliability of essential system components.
Security of System Files. To protect Supplier Information Processing Systems and system files containing Confidential Information, Supplier will ensure that access to source code is restricted to authorized users who have a direct need to know. Supplier will: (a) Ensure that the integrity of files in the operating environment are maintained and monitored for approved change; (b) Ensure that all systems and software have the latest vendor-supplied security patches; (c) Establish a process to identify newly discovered security vulnerabilities and update system and application standards to address new vulnerability issues; and (d) Ensure internal and external network vulnerability scans are conducted at least quarterly and network and application layer penetration testing at least once a year.
Security of System Files. To protect Provider Information Processing Systems and system files containing Recipient Confidential Information, Provider will ensure that access to source code is restricted to authorized users who have a direct need to know. 10.1.1 Ensure that systems and software have the latest vendor-supplied security patches. 10.1.2 Establish a process to identify newly discovered security vulnerabilities and update system and application standards to address new vulnerability issues. 10.1.3 Ensure internal and external network vulnerability scans are conducted at least quarterly and network and application layer penetration testing at least once a year
Security of System Files. 1. NautaDutilh controls access to system files and the program’s source code. 2. Exposure of sensitive or critical data in test environments is strictly prohibited. Test data are carefully selected, protected and controlled. 3. The installation of software on production systems is strictly limited to the allocated functions within the ICT organisation.
Security of System Files. Access to source code must be limited and controlled. ▪ During and after development, all applications must ensure the security of system files, plus access to source code and test data. ▪ All back-door maintenance hooks must be removed from the application before production use. ▪ Application architecture must prohibit databases containing confidential information from residing on the same server as the application.
Security of System Files. To protect Information Processing System(s) and system files containing Protected Information, TrueCar will restrict access to source code to authorized users who have a direct need to know.

Related to Security of System Files

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Security of State Information The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Inspection of Property; Books and Records; Discussions (a) Keep proper books of records and account in which full, true and correct entries in conformity with GAAP and all Requirements of Law shall be made of all dealings and transactions in relation to its business and activities and (b) unless a Default or Event of Default has occurred and is continuing, not more than once a year and after at least five Business Days’ notice, (i) permit representatives of any Lender to visit and inspect any of its properties and examine and make abstracts from any of its books and records at any reasonable time to discuss the business, operations, properties and financial and other condition of the Borrower and its Significant Subsidiaries with officers and employees of the Borrower and its Significant Subsidiaries and (ii) use commercially reasonable efforts to provide for the Lenders (in the presence of representatives of the Borrower) to meet with the independent certified public accountants of the Borrower and its Subsidiaries; provided, that any such visits or inspections shall be subject to such conditions as the Borrower and each of its Significant Subsidiaries shall deem necessary based on reasonable considerations of safety and security; and provided, further, that neither the Borrower nor any Significant Subsidiary shall be required to disclose to any Lender or its agents or representatives any information which is subject to the attorney-client privilege or attorney work-product privilege properly asserted by the applicable Person to prevent the loss of such privilege in connection with such information or which is prevented from disclosure pursuant to a confidentiality agreement with third parties.

  • Inspection of Property and Books and Records The Company shall maintain and shall cause each Subsidiary to maintain proper books of record and account, in which full, true and correct entries in conformity with GAAP consistently applied shall be made of all financial transactions and matters involving the assets and business of the Company and such Subsidiary. The Company shall permit, and shall cause each Subsidiary to permit, representatives and independent contractors of the Agent or any Bank to visit and inspect any of their respective properties, to examine their respective corporate, financial and operating records, and make copies thereof or abstracts therefrom, and to discuss their respective affairs, finances and accounts with their respective directors, officers, and independent public accountants, all at the expense of the Company and at such reasonable times during normal business hours and as often as may be reasonably desired, upon reasonable advance notice to the Company; provided, however, when an Event of Default exists the Agent or any Bank may do any of the foregoing at the expense of the Company at any time during normal business hours and without advance notice.

  • Inspection of Property, Books and Records The Borrower will keep, and will cause each Subsidiary to keep, proper books of record and account in which full, true and correct entries shall be made of all dealings and transactions in relation to its business and activities; and will permit, and will cause each Subsidiary to permit, representatives of any Bank at such Bank's expense to visit and inspect any of their respective properties, to examine and make abstracts from any of their respective books and records and to discuss their respective affairs, finances and accounts with their respective officers, employees and independent public accountants, all at such reasonable times and as often as may reasonably be desired.