BASIC SAFEGUARDING OF COVERED CONTRACTOR INFORMATION SYSTEMS Sample Clauses

BASIC SAFEGUARDING OF COVERED CONTRACTOR INFORMATION SYSTEMS. This Section 10 applies to the extent this PO is for the purchase of item(s) OTHER THAN COTS (defined above) wherein the Seller may have Federal contract information residing in or transiting through its information systems. Seller agrees:
AutoNDA by SimpleDocs
BASIC SAFEGUARDING OF COVERED CONTRACTOR INFORMATION SYSTEMS. (JUN 2016)
BASIC SAFEGUARDING OF COVERED CONTRACTOR INFORMATION SYSTEMS. Safeguarding requirements and procedures.
BASIC SAFEGUARDING OF COVERED CONTRACTOR INFORMATION SYSTEMS. When Federal contract information is provided for performance of this purchase order, the Contractor shall provide Basic Safeguarding of Covered Contractor Information Systems in accordance with the substance of FAR 52.204- 21.

Related to BASIC SAFEGUARDING OF COVERED CONTRACTOR INFORMATION SYSTEMS

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Privacy of Customer Information (i) Seller’s Customer Information in the possession of Purchaser, other than information independently obtained by Purchaser and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of Seller. Except in accordance with this Section18(b), Purchaser shall not use any Seller’s Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, customers, or disclose any Seller’s Customer Information to any Person, including any of Purchaser’s employees, agents or contractors or any third party not affiliated with Purchaser. Purchaser may use or disclose Seller’s Customer Information only to the extent necessary (1) for examination and audit of Purchaser’s activities, books and records by Purchaser’s regulatory authorities, (2) to protect or exercise Purchaser’s rights and privileges or (3) to carry out Purchaser’s express obligations under this Agreement and the other Program Documents (including providing Seller’s Customer Information to Takeout Buyers), and for no other purpose; provided that Purchaser may also use and disclose Seller’s Customer Information as expressly permitted by Seller in writing, to the extent that such express permission is in accordance with the Privacy Requirements. Purchaser shall take commercially reasonable steps to ensure that each Person to which Purchaser intends to disclose Seller’s Customer Information, before any such disclosure of information, agrees to keep confidential any such Seller’s Customer Information and to use or disclose such Seller’s Customer Information only to the extent necessary to protect or exercise Purchaser’s rights and privileges, or to carry out Purchaser’s express obligations, under this Agreement and the other Program Documents (including providing Seller’s Customer Information to Takeout Buyers). Xxxxxxxxx agrees to maintain an information security program and to assess, manage and control risks relating to the security and confidentiality of Seller’s Customer Information pursuant to such program in the same manner as Purchaser does in respect of its own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 168, 170, 208, 211, 225, 263, 308 and 364. Without limiting the scope of the foregoing sentence, Purchaser shall use at least the same physical and other security measures to protect all of Seller’s Customer Information in its possession or control as it uses for its own customers’ confidential and proprietary information.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Voice Information Service Traffic 5.1 For purposes of this Section 5, (a) Voice Information Service means a service that provides [i] recorded voice announcement information or [ii] a vocal discussion program open to the public, and (b) Voice Information Service Traffic means intraLATA switched voice traffic, delivered to a Voice Information Service. Voice Information Service Traffic does not include any form of Internet Traffic. Voice Information Service Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information Service Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Access to Protected Health Information 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524.

  • Safeguarding Information Not to use or disclose any information concerning a recipient of services under this contract for any purpose not in conformity with state and federal law except upon written consent of the recipient, or the responsible parent or guardian when authorized by law.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation as Local Traffic under the Interconnection Attachment.

Time is Money Join Law Insider Premium to draft better contracts faster.