Examples of Systems Security in a sentence
The IT-RA shall be consistent, in form and content, with NIST SP 800-30, Risk Management Guide for Information Technology Systems, and any additions or augmentations described in the HHS-OCIO Information Systems Security and Privacy Policy.
Specific security procedures are detailed in the FRC Information Systems Security Policy and Standards, which is available on the FRC Group's intranet site.
In addition to the above, the FRC Group Information Systems Security Policy and Standards set forth specific computing resource and information asset usage standards which must be adhered to.
Information Systems Security Threats New Gold has entered into agreements with third parties for hardware, software, telecommunications and other information technology (“IT”) services in connection with its operations.
Code of Business Conduct and Ethics, effective April 2021 Conflicts of Interest Policy, effective January 2020 Policy on Confidential Information, effective December 2016 Policy on Inventions, effective August 2008 Information Systems Security Policy, effective April 2020 Harassment Prevention Policy, effective July 2021 Equal Employment Opportunity Policy, effective July 2021 By accepting this Agreement, you acknowledge that you have read and agree to all of the terms and conditions set forth above.
Code of Business Conduct and Ethics, effective September 2018 Conflicts of Interest Policy, effective January 2020 Policy on Confidential Information, effective December 2016 Policy on Inventions, effective August 2008 Information Systems Security Policy, effective April 2020 Harassment Prevention Policy, effective January 2020 Equal Employment Opportunity Policy, effective May 2017 By accepting this Agreement, you acknowledge that you have read and agree to all of the terms and conditions set forth above.
Code of Business Conduct and Ethics, effective February 2022 Conflicts of Interest Policy, effective January 2020 Policy on Confidential Information, effective December 2016 Policy on Inventions, effective August 2008 Information Systems Security Policy, effective April 2020 Harassment Prevention Policy, effective July 2022 Equal Employment Opportunity Policy, effective July 2022 By accepting this Agreement, you acknowledge that you have read and agree to all of the terms and conditions set forth above.
The Contractor shall comply with the HSPD-12 requirements contained in "HHS-Controlled Facilities and Information Systems Security" requirements specified in the SOW/PWS of this contract.
Virtusa shall establish and maintain safeguards against the destruction, loss or alteration of Metavante Data in the possession of Virtusa on the terms set forth in the Virtusa Information Systems Security Policy Manual Version 1.0 (the “Data Security Policy”) and previously provided to Metavante.
The following sections shall survive any termination of this Agreement: Article II (Service Charges) (to the extent of amounts incurred prior to termination or expiration of the Term); Section 3.1 (Payment) (to the extent of amounts accrued prior to termination or owing to Buyer after the expiration of the Term); Section 5.1 (Title to Intellectual Property); this Section 6.3 (Survival); Article VII (Confidentiality; Systems Security); Section 8.1 (Indemnity); and Article IX (Miscellaneous).