E7 Security Sample Clauses

E7 Security. The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.
E7 Security. The Contractor shall take all measures necessary to comply with the provisions of any enactment relating to security that may be applicable to the Contractor in the performance of the Services.
E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).
E7 Security. XXX shall be responsible for maintaining the security of XXX’x premises in accordance with its standard security requirements. The Contractor shall comply with all reasonable security requirements of XXX while on the Premises, and shall procure that all of its employees, agents, servants and sub-contractors shall likewise comply with such requirements.
E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of Services to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows:
E7 Security. The Provider shall take all measures necessary to comply with the provisions of any enactment relating to security that may be applicable to the Provider in the performance of the Services.
E7 Security. Clause Not Used E8 Intellectual Property Rights
E7 Security. E7.1 The Contractor shall take all measures necessary to comply with the provisions of any enactment relating to security that may be applicable to the Contractor in the performance of the Services. E7.2 Whilst on the Authority's Premises, Staff shall comply with all security measures implemented by the Authority in respect of Staff and other persons attending those Premises. E8 Intellectual Property Rights E8.1 All Intellectual Property Rights in any guidance, specifications, instructions, toolkits, plans, data, drawings, databases, patents, patterns, models, designs or other material: a) furnished to or made available to the Contractor by or on behalf of the Authority shall remain the property of the Authority; or b) prepared by or for the Contractor on behalf of the Authority for use, or intended use, in relation to the performance by the Contractor of its obligations under the Contract shall belong to the Authority, and the Contractor shall not, and shall ensure that the Staff shall not, (except when necessary for the performance of the Contract) without prior Approval, use or disclose any such Intellectual Property Rights. E8.2 The Contractor shall obtain approval before using any material, in relation to the performance of its obligations under the Contract which is or may be subject to any third party Intellectual Property Rights. The Contractor shall ensure that the owner of the rights grants to the Authority a non-exclusive licence, or if itself a licensee of those rights, shall grant to the Authority an authorised sub-licence, to use, reproduce, modify, develop and maintain the material. Such licence or sub-licence shall be non-exclusive, perpetual, royalty free and irrevocable and shall include the right for the Authority to sub-license, transfer, novate or assign to other Contracting Authorities, the Replacement Contractor or to any other third party supplying services to the Authority. E8.3 The Contractor shall not infringe any Intellectual Property Rights of any third party in supplying the Services and the Contractor shall, during and after the Contract Period, indemnify and keep indemnified and hold the Authority and the Crown harmless from and against all actions, suits, claims, demands, losses, charges, damages, costs and expenses and other liabilities which the Authority or the Crown may suffer or incur as a result of or in connection with any breach of this clause, except where any such claim arises from; a) items or materials based upo...
E7 Security. E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on any premises that are required to be worked on as part of this contract (not limited to but including the Authority’s Premises and Local Authorities’ Premises), and shall ensure that all Staff comply with such requirements. E7.2 The Authority shall provide to the Contractor upon request copies of its written security procedures. E7.3 The Contractor shall, as an enduring obligation throughout the Contract, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment. E7.4 Notwithstanding Condition E7.3, if Malicious Software is found, the Parties shall co- operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the provision of G&S to their desired operating efficiency. E7.5 Any cost arising out of the actions of the Parties taken in compliance with clause E7.4 shall be borne by the Parties as follows: (a) by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and (b) by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).
E7 Security. The Supplier shall take all measures necessary to comply with the provisions of any enactment relating to security that may be applicable to the Supplier in the performance of the Service.
OSZAR »