Adequate security Sample Clauses
POPULAR SAMPLE Copied 2 times
Adequate security. The Crew Member’s safety is not known to be at risk by staying at the hotel.
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall—
Adequate security. The Contractor shall provide adequate security on all covered contractor information systems. To provide adequate security, the Contractor shall implement, at a minimum, the following information security protections:
(1) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government, the following security requirements apply:
(i) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract.
(ii) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract.
(2) For covered contractor information systems that are not part of an IT service of system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1) of this clause, the following security requirements apply:
(i) Except as provided in paragraph (b)(2)(ii) of this clause, the covered contractor information system shall be subject to the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” (available via the Internet at ▇▇▇▇://▇▇.▇▇▇.▇▇▇/10.6028/NIST.SP.800-171) in effect at the time the solicitation is issued or as authorized by the Contracting Officer.
(ii) (A) The Contractor shall implement NIST SP 800-171, as soon as practical, but not later than December 31, 2017. For all contracts awarded prior to October 1, 2017, the Contractor shall notify the DoD Chief Information Officer (CIO), via email at ▇▇▇.▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award.
Adequate security. When any event occurs that Lender determines may endanger completion of the Project or the fulfillment of any condition or covenant in this Agreement, Lender may require Borrower to furnish, within ten (10) days after delivery of a written request, adequate security to eliminate, reduce, or indemnify Lender against, such danger. In addition, upon such occurrence, Lender in its sole discretion may advance funds or agree to undertake to advance funds to any party to eliminate, reduce, or indemnify Lender against, such danger or to complete the Project. All sums paid by Lender pursuant to such agreements or undertakings shall be for Borrower's account and shall be without prejudice to Borrower's rights, if any, to receive such funds from the party to whom paid. All sums expended by Lender in the exercise of its option to complete the Project or protect Lender's interests shall be payable to Lender on demand together with interest from the date of the Advance at the rate applicable to the Loan. In addition, any Advance of funds under this Agreement, including without limitation direct disbursements to the General Contractor or other parties in payment of sums due under the Construction CONSTRUCTION LOAN AGREEMENT Loan No. 55032 (CONTINUED) Page 11 Contract, shall be deemed to have been expended by or on behalf of Borrower and to have been secured by Lender's Deed of Trust, if any, on the Collateral.
Adequate security. The Contractor shall provide adequate security on all covered contractor information systems. To provide adequate security, the Contractor shall implement, at a minimum, the following information security protections:
(1) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government, the following security requirements apply:
Adequate security. The Contractor shall provide adequate security on all covered con- tractor information systems. To provide ▇▇▇- ▇▇▇▇▇ security, the Contractor shall imple- ment, at a minimum, the following informa- tion security protections:
(1) For covered Contractor information systems that are part of an information technology (IT) service or system operated on behalf of the Government, the following security requirements apply:
(i) Cloud computing services shall be sub- ject to the security requirements specified in the clause 1252.239–76, Cloud Computing Serv- ices, of this contract.
(ii) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements speci- fied elsewhere in this contract.
(2) For covered Contractor information systems that are not part of an IT service or system operated on behalf of the Govern- ment and therefore are not subject to the se- curity requirement specified at paragraph (b)(1) of this clause, the following security requirements apply:
(i) Except as provided in paragraph (b)(2)(iv) of this clause, the contractor infor- mation system shall be subject to the secu- rity requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800–171, Revision 2, ‘‘Pro- tecting Controlled Unclassified Information in Nonfederal Information Systems and Or- ganizations’’ (available via the internet at ▇▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/detail/sp/800- 171/rev-2/final) in effect at the time the solici- tation is issued or as authorized by the Con- tracting Officer.
(ii) The Contractor shall implement NIST SP 800–171, Rev. 2, no later than 30 days after the award of this contract. The Contractor shall notify Contract Officer of any security requirements specified by NIST SP 800–171, Rev. 2 not implemented within 30 days of time of contract award.
(iii) If the Offeror proposes to vary from any security requirements specified by NIST SP 800–171, Rev. 2 in effect at the time the solicitation is issued or as authorized by the Contracting Officer, the Offeror shall submit to the Contracting Officer, for consideration by the DOT Chief Information Officer (CIO), a written explanation of—
(A) Why a particular security requirement is not applicable; or
(B) How the Contractor will use an alter- native, but equally effective, security meas- ure to satisfy the requirements of NIST SP 800–171, Rev.
(iv) The Office of the DOT CIO will evalu- ate offeror requests to vary from NIST SP 800–...
Adequate security. The PSAH shall provide Adequate Security on all Covered Contractor Information Systems. To provide Adequate Security, the PSAH shall implement, at a minimum, the following information security protections:
1. For Covered Contractor Information Systems that are part of an IT service or system operated on behalf of the Government, the following security requirements apply:
a. Cloud computing services shall be subject to the security requirements specified:
i. The PSAH shall implement and maintain administrative, technical, and physical safeguards and controls with the security level and services required in accordance with the DoD Cloud Computing Security Requirements Guide (CC SRG) found at ▇▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇.▇▇▇/dccs unless notified by the AOR that this requirement has been waived by the DoD Chief Information Officer (CIO).
ii. The PSAH shall maintain within the U.S. or outlying areas all Government data that is not physically located on Government premises, unless the PSAH receives written notification from the AOR to use another location.
b. Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in a resulting PSA. Base Agreement No. 2025-391 January 2024
2. For Covered Contractor Information Systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph A.1. of this Article, the following security requirements apply:
a. Except as provided in paragraph 2.b. of this Article, the Covered Contractor Information System shall be subject to the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171r2, “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations” in effect at the time the solicitation is issued or as authorized by the AO.
b. The NIST Considerations:
i. The PSAH shall implement NIST SP 800-171r2, as soon as practical.
ii. The PSAH shall submit requests to vary from NIST SP 800-171 in writing to the AO, through the CMO, for consideration by the DoD CIO. The PSAH need not implement any security requirement adjudicated by an authorized representative of the DoD CIO to be non-applicable or to have an alternative, but equally effective, security measures that may be implemented in its place.
iii. If the DoD CIO has previously adjudicated the PSAH’s requests indicating that a requ...
Adequate security a) Sections 26.4 of the DDA shall be deleted in its entirety and replaced with the following:
Adequate security. Each loan and related promissory note shall be secured by an assignment of no more than 50 percent of the Participant's Account to the Loan Trustee. A Participant may also provide such other or additional security for the loan as the Loan Trustee may require or permit.
Adequate security. When any event occurs that Lender determines may endanger completion of the Project or the fulfillment of any condition or covenant in this Agreement, Lender may require Borrower to furnish, within ten (10) days after delivery of a written request, adequate security to eliminate, reduce, or indemnify Lender against, such danger. In addition, upon such occurrence, Lender in its sole discretion may advance funds or agree to undertake to advance funds to any party to eliminate, reduce, or indemnify Lender against, such danger or to complete the Project. All sums paid by Lender pursuant to such agreements or undertakings shall be for Borrower's account and shall be without prejudice to Borrower's rights, if any, to receive such funds from the party to whom paid. All sums expended by Lender in the exercise of its option to complete the Project or protect Lender's interests shall be payable to Lender on demand together with interest from the date of the Advance at the rate applicable to the Loan. In addition, any Advance of funds under this Agreement, including without limitation direct disbursements to the General Contractor or other parties in payment of sums due under the Construction Contract, shall be deemed to have been expended by or on behalf of Borrower and to have been secured by Lender's Mortgage and Security Agreement, if any, on the Collateral.
