NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.
Legal Framework 1. This programme agreement shall be read in conjunction with the following documents which, together with this programme agreement, constitute the legal framework of the EEA Financial Mechanism 2014-2021: (a) Protocol 38c to the EEA Agreement on the EEA Financial Mechanism 2014-2021; (b) the Regulation on the implementation of the EEA Financial Mechanism 2014-2021 (hereinafter referred to as the “Regulation”) issued by the Donor States in accordance with Article 10(5) of Protocol 38c; (c) the Memorandum of Understanding on the Implementation of the EEA Financial Mechanism 2014-2021 (hereinafter referred to as the “MoU”), entered into between the Donor States and the Beneficiary State; and (d) any guidelines adopted by the FMC in accordance with the Regulation. 2. In case of an inconsistency between this programme agreement and the Regulation, the Regulation shall prevail. 3. The legal framework is binding for the Parties. An act or omission by a Party to this programme agreement that is incompatible with the legal framework constitutes a breach of this programme agreement by that Party.
Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.
Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.
Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).