Information Security Requirements Sample Clauses

Information Security Requirements. In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.
AutoNDA by SimpleDocs
Information Security Requirements. Web Services E-Verify Employer Agents performing verification services under this MOU must ensure that information that is shared between the Web Services E-Verify Employer Agent and DHS is appropriately protected comparable to the protection provided when the information is within the DHS environment [OMB Circular A-130 Appendix III]. To achieve this level of information security, the Web Services E-Verify Employer Agent agrees to institute the following procedures:
Information Security Requirements. (a) Contractor is required to comply with CSU Information Security Requirements as described in Rider A, Supplemental Provisions for General Provisions for Service Acquisitions, attached hereto and by reference made a part of this agreement.
Information Security Requirements a) Vendor shall comply with all applicable state and federal laws and regulations regarding confidentiality, privacy, and security pertaining to TSLAC confidential information.
Information Security Requirements. Company has adopted certain requirements relating to information security, which are attached as Attachment A to this Schedule, and Contractor agrees to abide by all such requirements.
Information Security Requirements. The terms and conditions of this exhibit meet and/or exceeds the information security requirements of the three national credit reporting agencies (Equifax Information Services LLC, Transunion, Experian Information Solutions, Inc.), where applicable, complies with the access of information requirements of the Federal Fair Credit Reporting Act and Xxxxx-Xxxxx-Xxxxxx Act for data privacy (FCRA and GLB 5A Data). In addition, this exhibit complies with the notification requirements prescribed by the California Consumer Credit Reporting Agencies Act which can be found at xxxxx://xxx.xx.xxx/privacy/ccpa, and the Vermont Fair Credit Reporting Statute, 9 V.S.A. § 2480e (1999) § 2480e which can be found at xxxxx://xxxxxxxxxxx.xxxxxxx.xxx/statutes/section/09/063/02480e, as well as the requirements of the Fair Xxxxx Company and affiliates (FICO).
Information Security Requirements. Web Services Employers performing verification services under this MOU must ensure that information that is shared between the Web Services Employer and DHS is appropriately protected comparable to the protection provided when the information is within the DHS environment [OMB Circular A-130 Appendix III]. To achieve this level of information security, the Web Services Employer agrees to institute the following procedures:
AutoNDA by SimpleDocs
Information Security Requirements. The State of California, Department of Child Support Services (DCSS) implemented information security standards outlined in the DCSS Information Security Manual (ISM), for the purpose of maintaining the security of child support information and assets. The ISM security policies and standards apply to Applicable Organizations, defined as “any organization whose employees or contractors have access to child support information or child support IT assets”. Local Child Support Agencies are required to ensure contractors having access to such information are required to comply with Third Party Vendor IT Security Policies included in the ISM. In keeping with ISM and County requirements, Contractor shall agree to comply with the DCSS ISM and implement the following administrative, physical, and information security safeguards to ensure the integrity, security, and confidentiality of all County of Orange Department of Child Support Services (CSS) information, including but not limited to electronic files, data, paper documents and forms, for the term and length of this contract and while in possession of, maintaining, or accessing CSS information. The DCSS ISM and all revisions as the DCSS ISM is modified may be viewed at: xxxx://xxx.xxxxxxxx.xx.xxx/Portals/0/home/docs/InfoSecurityManual.pdf I. ADMINISTRATIVE SAFEGUARDS Contractor shall:
Information Security Requirements. Each Party shall, with respect to the other Party’s Confidential Information, comply with the most stringent of the information security and privacy policies (i) in effect at Boise Cascade immediately prior to the Execution Date; (ii) required by Law; or (iii) utilized by the Party in possession of such Confidential Information from time to time. In addition, in the event of any breach of the foregoing which results in the release of material Confidential Information of a Party to third parties not controlled by the releasing Party or to the general public, the Party responsible for such breach shall promptly notify the other Party as soon as it becomes aware of any such breach, violation or incident.
Information Security Requirements. (a) Vidyard shall have implemented and documented appropriate administrative, technical and physical measures set forth in the Agreement, as applicable, to protect Personal Information against accidental or unlawful destruction, alteration, unauthorized disclosure or access. Vidyard will regularly test and monitor the effectiveness of its safeguards, controls, systems and procedures. Vidyard will periodically identify reasonably foreseeable internal and external risks to the security, confidentiality and integrity of the Personal Information, and ensure that these risks are addressed.
Time is Money Join Law Insider Premium to draft better contracts faster.