Systems and Security Clause Samples

The Systems and Security clause establishes requirements and standards for the protection and management of information systems and data. It typically outlines the security measures that must be implemented, such as access controls, encryption, regular security assessments, and incident response protocols. This clause applies to any party handling sensitive or proprietary information, ensuring that both technical and organizational safeguards are in place. Its core function is to mitigate the risk of data breaches, unauthorized access, and other security threats, thereby protecting the integrity and confidentiality of information shared under the agreement.
Systems and Security. ▇▇▇▇▇▇ ▇. ▇▇▇▇▇ Information System Security Officer (ISSO) Division of Marketplace IT Operations Marketplace IT Group Center for Consumer Information & Insurance Oversight Centers for Medicare & Medicaid Services ▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ Baltimore, MD 21244 Telephone: (▇▇▇) ▇▇▇-▇▇▇▇ Telephone: (▇▇▇) ▇▇▇-▇▇▇▇ (Mobile) Email: ▇▇▇▇▇▇.▇▇▇▇▇@▇▇▇.▇▇▇.▇▇▇ ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ CMS Privacy Act Officer Division of Security, Privacy Policy and Governance Information Security and Privacy Group Office of Information Technology Centers for Medicare & Medicaid Services ▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ Location: N1-14-56 Baltimore, MD ▇▇▇▇▇-▇▇▇▇ Telephone: (▇▇▇) ▇▇▇-▇▇▇▇ Email: ▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇▇.▇▇▇.▇▇▇
Systems and Security. 13.1 The Service Provider confirms that it will at all times adhere to the Municipality’s IT Policies during the tenure of this agreement when undertaking work on the municipal system. 13.2 The Parties must ensure that no person other than those authorised has or obtains access to the information and systems of the Municipality. 13.3 Each Party must immediately notify the other in writing if it has a reason to believe that any of the Municipality’s confidential information or transactions may have been viewed by an unauthorised person. 13.4 Should any security threat be identified by either Party, the Service Provider must on such identification immediately notify the Municipality through any reasonable urgent means of communication regarding the security threat that has been identified as it relates to the Services and must take all such remedial actions as in necessary to remove any such threat. The Service Provider will provide the Municipality with written communication regarding the actions taken in this regard.
Systems and Security. 6.1. In addition to any other data security terms set forth in this Agreement, if Partner is granted access to any WhatsApp or its Affiliates’ systems, networks, databases, computers, or other information systems owned, controlled or operated by or on their respective behalf (collectively “System(s)”), then such access is subject to Partner’s and the Partner Parties’ Compliance. Access to Systems is granted solely to facilitate the Services, and is limited to those specific Systems, time periods, and personnel as are separately designated by WhatsApp in writing. Partner represents and warrants that it has adequate security measures in place to comply with the above obligations and to ensure that access granted arising from this Agreement will not impair the integrity and availability of Systems. 6.2. Partner represents and warrants that it shall not introduce into WhatsApp’s Systems or Infrastructure, the Sublicensed Encryption Software, or otherwise make accessible to WhatsApp any viruses or any software licensed under the General Public Licence or any similar licence (e.g. GNU Affero General Public License (AGPL), GNU General Public License (GPL), GNU Lesser General Public License (LGPL)) containing a "copyleft" requirement during performance of the Services. Partner shall implement the security objectives described below to protect its systems, including the physical, technical, and administrative controls that govern access to and use of the Partner systems. To enable oversight of the Partner’s implementation of the measures, Partner shall have in place a dedicated security team to oversee the development, implementation, effectiveness testing and ongoing maintenance of a security program, in order to realise these security requirements. The Partner shall also, at the request of WhatsApp, be able to describe the means by which it is achieving these security requirements and shall maintain appropriate records and other evidence to enable the Partner to review the implemented security measures.
Systems and Security. ▇▇▇▇▇▇ ▇. ▇▇▇▇▇

Related to Systems and Security

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Background Screening and Security All Contractor employees, Subcontractors and agents of the Contractor performing work under the Contract must comply with all background screening and security requirements of the Department, as detailed below.

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Agreement. Contractor shall be responsible to ascertain from the District the rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.