Information Systems Security Sample Clauses

Information Systems Security. If the individual purchase order is for operationally critical support or for which performance will involve covered defense information, Supplier is required to provide adequate security on all covered contractor information systems. To provide such security, Supplier must implement information security protections, including compliance with the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.” See DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting (OCT 2016). Federal Acquisition Regulation (FAR) Clauses 52.202-1 DEFINITIONS. 52.203-6, RESTRICTIONS ON SUBCONTRACTOR SALES TO THE GOVERNMENT (SEP 2006) (Applicable to purchase orders that exceed the simplified acquisition threshold ($150,000)). 52.203-7, ANTI-KICKBACK PROCEDURES (MAY 2014) (Applicable to purchase orders that exceed $150,000).
AutoNDA by SimpleDocs
Information Systems Security. A comprehensive information technology security policy shall be developed on the basis of an approved strategy for information and communication technology to ensure confidentiality, integrity and availability of all data:
Information Systems Security. All the technical and non-technical means of protection, allowing an Information System to withstand events likely to compromise the availability, integrity and confidentiality of data processed or transmitted and the related services that these systems offer or make accessible. 3DS OUTSCALE Service(s) or Service(s): The IaaS services ordered by the CLIENT in the framework of the Agreement and subject to this Service Agreement in application thereof.
Information Systems Security. In the event this Agreement or an Order provides for remote access to Company’s electronic information systems (“CIS”) by Provider, Provider shall at all times protect CIS through procedures and tools deemed satisfactory to Company. Such procedures and tools shall include without limitation:
Information Systems Security. Employees working for the Lake Preston School District at alternative work sites should use District provided computers and other devices that have been approved by the Technology Department. It is not recommended for Remote workers to use their own mobile computing devices, computers, or computer software. Remote Working networks should all be password secured and systems that access Lake Preston networks remotely must have an anti-malware (anti-virus) package and an endpoint protection software package installed that protects the network from advanced threats that has been approved by the Technology Department.
Information Systems Security. If Nortel grants Seller access to Nortel’s information systems, Seller will safeguard the security of Nortel’s information systems, as set out in Exhibit O, attached to and incorporated in this Agreement.
Information Systems Security. 1.8.1 Generally, includes the installation, configuration, administration, operation, maintenance, and monitoring of security and backup/recovery processes as well as network security systems
AutoNDA by SimpleDocs
Information Systems Security. The Supplier shall ensure that the information system provided under this Contract shall comply with all applicable state and Federal laws and amendments, regulations and policies relating to Medicaid and system security, confidentiality, integrity, availability, and safeguarding of information, including:
Information Systems Security. Our Information Security Program is designed to defend against security intrusion through a combination of layered prevention technologies and comprehensive security monitoring. Our security infrastructure has been designed according to industry standards for virus protection, firewalls and intrusion-prevention technologies in order to prevent unauthorized access or compromises of CDW’s network, systems and servers. To maintain this level of security, CDW: • Periodically tests systems to identify/remediate information security issues • Conducts vulnerability scans • Usesindustry-standardsecurityresourcestoobtainup-to-dateinformationonsecurity issues across many technologies • Monitors network connections with intrusion prevention/detection systems • Bans use of insecure protocols in infrastructure management or transmitting sensitive information • Configures network and system devices so event logs are maintained in a centralized system • Requires CDW management approval for any direct connections to our information systems • Isolates guest wireless networks and unauthenticated connectivity from CDW internaltraffic
Information Systems Security. The Board and the Recorder will jointly provide information systems security services. The Parties will cooperate and coordinate with respect to these security services, consistent with all State and Federal laws and regulations governing election security, including, but not limited to, threat monitoring, video recording, and cyber-attack prevention. Both the Recorder and the Board will work with the Maricopa County Sheriff’s Office and other law enforcement agencies as warranted under this section.
Time is Money Join Law Insider Premium to draft better contracts faster.