Data and Communications Security Sample Clauses

Data and Communications Security. (The Privacy Act of 1974, E-Government Act of 2002 (P.L. 107-347), and the Access Control (AC), Configuration Management (CM), Media Protection (MP), and System and Communication (SC) Families, NIST SP 800-53 rev. 4) SSA requires EIEPs to encrypt PII and SSA-provided information when transmitting across dedicated communications circuits between its systems, intrastate communications between its local office locations, and on the EIEP’s mobile computers, devices and removable media. The EIEP’s encryption methods must align with the Guidelines established by the National Institute of Standards and Technology (NIST). SSA recommends the Advanced Encryption Standard (AES) or Triple DES (Data Encryption Standard 3). Files encrypted for external users (when using tools such as Microsoft Word encryption,) require a key length of at least nine characters. SSA recommends that the key (also referred to as a password) contain both special characters and numbers. SSA supports the NIST Guidelines that requires the EIEP deliver the key so that it does not accompany the media. The EIEP must secure the key when not in use or unattended. SSA discourages the use of the public Internet for transmission of SSA- provided information. If, however, the EIEP uses the public Internet or other electronic communications, such as emails and faxes to transmit SSA-provided information, they must use a secure encryption protocol such as Secure Socket Layer (SSL) or Transport Layer Security (TLS). SSA also recommends 256- bit encryption protocols or more secure methods such as Virtual Private Network technology. The EIEP should only send data to a secure address or device to which the EIEP can control and limit access to only specifically authorized individuals and/or processes. SSA recommends that EIEPs use Media Access Control (MAC) Filtering and Firewalls to protect access points from unauthorized devices attempting to connect to the network.
AutoNDA by SimpleDocs
Data and Communications Security. 5.9 Incident Reporting
Data and Communications Security. The encryption method employed must meet acceptable standards designated by the National Institute of Standards and Technology (NIST). The recommended encryption method to secure data in transport for use by SSA is the Advanced Encryption Standard (AES) or triple DES (DES3) if AES is unavailable.
Data and Communications Security 

Related to Data and Communications Security

  • Agreement Administration and Communications A. Under this Agreement, either of the representatives of the Judicial Council identified below will monitor the Work and act as the Judicial Council’s liaisons with the Contractor:

  • Use of Verizon Telecommunications Services 2.1 Verizon Telecommunications Services may be purchased by Connectel under this Resale Attachment only for the purpose of resale by Connectel as a Telecommunications Carrier. Verizon Telecommunications Services to be purchased by Connectel for other purposes (including, but not limited to, Connectel’s own use) must be purchased by Connectel pursuant to other applicable Attachments to this Agreement (if any), or separate written agreements, including, but not limited to, applicable Verizon Tariffs.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to Reconex for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers.

  • Fund Communications The Service Provider shall, upon request by the Fund, on each business day, report the number of shares on which the transfer agency fee is to be paid pursuant to this Agreement. The Service Provider shall also provide the Fund with a monthly invoice.

  • Incident Event and Communications Management a. Incident Management/Notification of Breach - Transfer Agent shall develop, implement and maintain an incident response plan that specifies actions to be taken when Transfer Agent or one of its subcontractors suspects or detects that a party has gained material unauthorized access to Fund Data or systems or applications containing any Fund Data (the “Response Plan”). Such Response Plan shall include the following:

  • Information and communication The Parties shall support the development of modern methods of information handling, including the media, and stimulate the effective mutual exchange of information. Priority shall be given to programmes aimed at providing the general public with basic information about the Community and the Republic of Azerbaijan, including, where possible, access to databases, in full respect of intellectual property rights.

  • Telecommunications Services The offering of telecommunications for a fee directly to the public, or to such classes of users as to be effectively available directly to the public, regardless of the facilities used.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Communications and Computer Lines Tenant may install, maintain, replace, remove or use any communications or computer wires and cables (collectively, the "Lines") at the Project in or serving the Premises, provided that (i) Tenant shall obtain Landlord's prior written consent, use an experienced and qualified contractor reasonably approved by Landlord, and comply with all of the other provisions of Articles 7 and 8 of this Lease, (ii) an acceptable number of spare Lines and space for additional Lines shall be maintained for existing and future occupants of the Project, as determined in Landlord's reasonable opinion, (iii) the Lines therefor (including riser cables) shall be (x) appropriately insulated to prevent excessive electromagnetic fields or radiation, (y) surrounded by a protective conduit reasonably acceptable to Landlord, and (z) identified in accordance with the "Identification Requirements," as that term is set forth hereinbelow, (iv) any new or existing Lines servicing the Premises shall comply with all applicable governmental laws and regulations, (v) as a condition to permitting the installation of new Lines, Tenant shall remove existing Lines located in or serving the Premises and repair any damage in connection with such removal, and (vi) Tenant shall pay all costs in connection therewith. All Lines shall be clearly marked with adhesive plastic labels (or plastic tags attached to such Lines with wire) to show Tenant's name, suite number, telephone number and the name of the person to contact in the case of an emergency (A) every four feet (4') outside the Premises (specifically including, but not limited to, the electrical room risers and other Common Areas), and (B) at the Lines' termination point(s) (collectively, the "Identification Requirements"). Landlord reserves the right to require that Tenant remove any Lines located in or serving the Premises which are installed in violation of these provisions, or which are at any time (1) are in violation of any Applicable Laws, (2) are inconsistent with then-existing industry standards (such as the standards promulgated by the National Fire Protection Association (e.g., such organization's "2002 National Electrical Code")), or (3) otherwise represent a dangerous or potentially dangerous condition.

  • Testing-the-Waters Communications If at any time following the distribution of any Written Testing-the-Waters Communication there occurred or occurs an event or development as a result of which such Written Testing-the-Waters Communication included or would include an untrue statement of a material fact or omitted or would omit to state a material fact necessary in order to make the statements therein, in the light of the circumstances existing at that subsequent time, not misleading, the Company shall promptly notify the Representative and shall promptly amend or supplement, at its own expense, such Written Testing-the-Waters Communication to eliminate or correct such untrue statement or omission.

Time is Money Join Law Insider Premium to draft better contracts faster.