Data and Security System Framework Sample Clauses

Data and Security System Framework. The Contractor shall comply with either of the following: • Provide certification of compliance with a minimum of one of the following security frameworks, if the Contractor is storing Confidential Information electronically: NIST SP 800-53, HITRUST version 9, COBIT 5, CSA STAR Level 2 or greater, or ISO 27001 prior to implementation of the system and again when the certification(s) expire, or • Provide attestation of a passed information security risk assessment, passed network penetration scans, and passed web application scans (when applicable) prior to implementation of the system and again annually thereafter. For purposes of this section, “passed” means no unresolved high or critical findings.
AutoNDA by SimpleDocs
Data and Security System Framework. If storing confidential Agency information, the Contractor shall comply with either of the following: • Provide certification of compliance with a minimum of one (1) of the following security frameworks, if the Contractor is storing Confidential Information electronically: NIST SP 800-53, HITRUST version 9, SOC 2, COBIT 5, CSA STAR Level 2 or greater, ISO 27001 or PCI-DSS version 3.2 prior to implementation of the system and again when the certification(s) expire, or • Provide attestation of a passed information security risk assessment, passed network penetration scans, and passed web application scans (when applicable) prior to implementation of the system and again annually thereafter. For the purposes of this section, “passed” means no unresolved high or critical findings.
Data and Security System Framework. The Contractor shall comply with either of the following:

Related to Data and Security System Framework

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA.

  • Background Screening and Security 14 These General Contract Conditions supersede and replace in their entirety all General Contract Conditions, Form PUR 1000, which is incorporated by reference in Rule 60A-1.002, Florida Administrative Code (F.A.C.)

  • Support and Services ISD and HC agree to the following conditions:

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

Time is Money Join Law Insider Premium to draft better contracts faster.