Cyber Security Incident Response and Management Sample Clauses

Cyber Security Incident Response and Management. Contractor shall provide services in accordance with the following requirements and capabilities: Description - Service category to provide Cyber Security Incident Response and Management services necessary to ensure personnel at all levels respond to security incidents in a way that is rapid, compliant and thoughtful. Following are characteristics of this service category: Requirements / Capabilities • Certified Security Professionals writing plans, evaluating existing plans, documenting and recommending changes to incident response plans and related work.
AutoNDA by SimpleDocs
Cyber Security Incident Response and Management. Contractor shall provide services in accordance with the following requirements and capabilities: Description - Service category to provide Cyber Security Incident Response and Management services necessary to ensure personnel at all levels respond to security incidents in a way that is rapid, compliant and thoughtful. Following are characteristics of this service category: Requirements / Capabilities • Certified Security Professionals writing plans, evaluating existing plans, documenting and recommending changes to incident response plans and related work. Examples of Potential Statements of work: • Classifying data stored or transmitted between computing platforms (e.g. PC, servers, mainframe) and networks; • Provide incident response and related training; • Exercise/simulate incident response scenarios; • 24/7 incident response assistanceVulnerability management • Policy/procedure development; • Provide operational and analytical support related to security for computing platforms (e.g. PC, servers, and mainframe) and networks. • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate meetings • Address security and incident response issues with functional areas and management • Analyze and evaluate new and emerging security technologies as well as vendor security products for their applicability and feasibility of use in securing hardware/software IT and telecommunications resources; • Perform security audits and/or penetration testing of IT systems and applications in the context of NIST, IRS 1075, CJIS, HIPAA and so on; • Provide operational and analytical support related to security for computing platforms (e.g. PC, servers, and mainframe) and networks.

Related to Cyber Security Incident Response and Management

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Incident Response Operator shall have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of any portion of Data, including PII, and agrees to provide LEA, upon request, an executive summary of the written incident response plan.

  • Workload Management 11.1 The parties to this Agreement acknowledge that employees and management have a responsibility to maintain a balanced workload and recognise the adverse affects that excessive workloads may have on employee/s and the quality of resident/client care.

  • Incident Management 3.1. We shall notify You without undue delay after We becomes aware of any accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Data, including Personal Data, stored or otherwise processed by Us or Our sub-processors of which We become aware (“Security Incident”).

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Management Responsibility No Limited Partner, as such, shall take part in the management of the business or transact any business for the Partnership.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Processing of a Grievance It is recognized and accepted by the Union and the Employer that the processing of grievances as hereinafter provided is limited by the job duties and responsibilities of the employees and shall therefore be accomplished during normal working hours only when consistent with such employee duties and responsibilities. The aggrieved employee and a Union representative shall be allowed a reasonable amount of time without loss of pay when a grievance is investigated and presented to the Employer during normal working hours provided that the employee and the Union representative have notified and received the approval of the designated supervisor who has determined that such absence is reasonable and would not be detrimental to the work programs of the Employer.

  • Network Maintenance and Management 36.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the Government, escalation processes, etc.) to achieve this desired result.

Time is Money Join Law Insider Premium to draft better contracts faster.