Information Technology Security Sample Clauses

Information Technology Security. A. The Financial Agent shall develop, maintain, enforce, and at least annually review for effectiveness, information technology security measures designed to ensure the (i) availability,
AutoNDA by SimpleDocs
Information Technology Security a. As a condition of access to this Center of Excellence, DHS agrees not to provide the Recipient any data or information that is sensitive or i.e., information or data that would not be released completely in response to a request under the Freedom of Information Act, 5 U.S.C. § 552. Should the Recipient receive any data or information from DHS that the Recipient has reason to believe may be sensitive or classified, within 24 hours, the Recipient shall (1) notify the DHS Grants Management Specialist named in the award documents; (2) shall send such data or information to the Grants Management Specialist, unless otherwise directed by DHS; (3) shall erase or otherwise destroy any vestige of such data or information in its records and computer systems; and (4) shall notify the Grants Management Specialist of the means and time of such destruction.
Information Technology Security. The Contractor shall provide information in both paper and electronic formats to Government Agencies and support services Contractors, including and especially the SNS, per USG direction. The Contractor shall provide the IT security plan to safeguard computers, databases, and other IT materials associated with the contract. This plan shall demonstrate confidentiality and integrity of and timely access by authorized individuals to data, information and information technology systems. The Contractor shall agree to comply with the IT system security and/or privacy specifications set forth in the Statement of Work, the Computer Security Act of 1987 Office of Management and Budget (OMB) Circular A-130, Appendix III, “Security of Federal Automated Information Systems,” and the DHHS Automated Information Systems Security Program Handbook (Release 2.0, dated May 1994). The Contractor further agrees to include this provision in any subcontract awarded pursuant to this prime contract. NOTE: OMB A-130 <hxxx://xxxxxxx.xxx.xxx/xxxxxx/aissp.html> is accessible via web site.
Information Technology Security. Services. Beginning on the Closing Date, Parent Group shall provide the following services in accordance with the IT Separation Standards:
Information Technology Security. The University acknowledges that, in connection with the services being provided hereunder, the Contractor may need to operate certain information technology systems, including, but not limited to, point-of-sale devices, e-commerce solutions, and computer hardware and software services and applications (collectively the “Non-University Systems”). The University further acknowledges that the Non-University Systems may need to interface with or connect to the University’s networks and information technology systems (collectively the “University Systems”). The University shall be solely responsible for all University Systems, and the Contractor shall be responsible for all non-University Systems, including taking reasonable security and privacy precautions including, but not limited to, network firewall protections, anti-virus software and the ability to maintain regular patching levels of mission-critical software. If the Contractor serves as the merchant-of-record for any credit or debit card transactions in connection with any of the services provided hereunder, the Contractor shall comply with all applicable laws, regulations and payment card industry data security standards related to the protection of cardholder data (collectively the “Data Protection Rules”). At the request of the Contractor, the University shall implement such changes to the University Systems as are necessary to enable the Contractor to comply with the Data Protection Rules.
Information Technology Security. In connection with the services being provided hereunder, the Hitching Post may need to operate certain information technology systems not owned by the Client (Non-Client Systems), which may need to interface with or connect to Client’s networks, internet access, or information tech- nology systems (Client Systems). The Hitching Post shall be responsible for all Non-Client Systems, and Client shall be solely responsible for Client Systems, including taking the necessary security and privacy protections as are reasonable under the circumstances. If the Hitching Post serves as the merchant-of-record for any credit or debit card transactions in connection with any of the services provided hereunder, then the Hitching Post will be re- sponsible for complying with all applicable laws, regulations and payment card industry data security standards related to the protection of cardholder data (Data Protection Rules). If Non-Client Systems interface with or con- nect to Client Systems, then Hitching Post will notify Client of the need for the Non-Client System to interface with the Client Systems. Upon receiving this notification, Client and Hitching Post agree to share the expense equally for any necessary changes to the Client Systems that the Parties agree are necessary or prudent to ensure the Hitching Post’s compliance with the Data Protection Rules. Each party shall indemnify, defend and hold harmless the other party from all claims, liabilities, damages and costs (including reasonable attorneys' fees) to the extent caused by the indemnifying party’s failure to comply with its obligations in this Section. Effective Date: Client: City of Xxxxxxxx By: (Authorized Officer or Principal Signature) Printed Name: Xxxxxx X. Xxxxxx Title: Mayor By: (Authorized Officer or Principal Signature) Printed Name: Xxxxxx Xxxxxxxx Title: City Clerk Signature Date: Principal Address: 000 X. Xxxx Xxxxxx, Xxxxxxxx, XX 00000 Premises Location(s): Amateur Sports Complex, 000 Xxxxx Xxxxx, Xxxxxxxx, XX 00000 Client Notice To: Name: Xxxxxxx Xxxxxxxx Title: Park & Recreation Superintendent The Hitching Post of Marshall, Inc. d/b/a Hitching Post Eatery and Saloon By: (Authorized Officer or Principal Signature) Printed Name: Xxxxxx Xxxxxxxxx Title: Signature Date: The Hitching Post Notice To: Name: Hitching Post of Xxxxxxxx, Inc. Attachment #1 Services Program: Payment Provisions
AutoNDA by SimpleDocs
Information Technology Security. In connection with the services being provided hereunder, Contractor may need to operate certain information technology systems not owned by the County (non-client systems)which may need to interface with or connect to the County networks, internet access, or information technology systems (County systems). Contractor shall be responsible for all non-county systems, and the County shall be solely responsible for County systems, including taking the necessary security and privacy protections as are reasonable under the circumstances. If the Contractor serves as the services provider hereunder, then the Contractor will be responsible for complying with all applicable laws, regulations and payment card industry data security standards related to the protection of cardholder data (data protection rules). If non- County systems interface with or connect to County systems, then the County agrees to implement forthwith upon request from the Contractor at its own expense, the changes to the County systems that the Contractor reasonably requests and believes are necessary and prudent to ensure Contractor’s compliance with the Data Card Protection Rules. Each party shall indemnify, defend and hold harmless the other party from all claims, liabilities, damages and costs (including reasonable attorney’s fees) to the extent caused by the indemnifying party’s failure to comply with its obligations in this Article.
Information Technology Security. Provide for information technology security in accordance with the STATE’s policies and procedures.
Information Technology Security. Seller shall: (i) protect the confidentiality, integrity and availability of (A) Viasat Confidential Information, and (B) if applicable, Federal Contract Information (“FCI”) covered by FAR 52.204-21 and/or Controlled Unclassified Information (“CUI”) covered by DFARS 252.204-7012, when those clauses are flowed down to Seller in support of a government contract, (ii) protect against any anticipated threats or hazards to the confidentiality, integrity, and availability of such Viasat Confidential Information, (iii) protect against any unauthorized access to or use of such Viasat Confidential Information and (iv) comply with all applicable legal and regulatory requirements for data protection. If requested by Viasat, Seller shall complete the Information Technology Security Questionnaire and cyber security certification provided by Viasat. Viasat shall have the right to conduct a security audit on the premises of Seller during normal business hours to ensure compliance with the foregoing security provisions. Viasat also has the right to conduct a desktop audit or have Seller participate in a mock cyber security drill. Such audits and security drills shall be subject to reasonable procedures and guidelines and shall be conducted in a manner so as not to unreasonably interfere with Seller’s operations. For the purposes of such audit or drills, Seller will provide access to: (i) any facility which Seller, its affiliates or any of its subcontractors uses to fulfil obligations under the Purchase Order, (ii) Seller personnel, (iii) Seller’s systems and (iv) Seller’s data and records, in each case only to the extent required to conduct such audits or drills permitted under the Purchase Order. With respect to any audit or drill findings of a failure of Seller to comply with the foregoing security provisions, Seller will promptly implement corrective or remedial action.
Time is Money Join Law Insider Premium to draft better contracts faster.