Isms and Security Management Plan Sample Clauses

Isms and Security Management Plan. Introduction Throughout the Term the Service Provider shall develop, implement, comply with (and ensure that all service provider personnel and Sub-Contractors implement and comply with) and maintain and continuously improve and maintain an ISMS which shall, without prejudice to Paragraphs 2.2 above and 4.1 below, be: approved by the Authority; tested in accordance with Paragraph 4; and periodically updated and audited in accordance with ISO/IEC 27001. The Service Provider shall develop and maintain a Security Management Plan in accordance with this Schedule to apply during the Term (and after the end of the Term as applicable) in both this Framework Agreement and all Call-Off Agreements. The Service Provider shall comply with its obligations set out in the Security Management Plan and the other elements of this Framework Agreement relevant to security (including the Security Requirements). Both the ISMS and the Security Management Plan shall, unless otherwise specified in writing by the Authority, aim to protect all aspects of the Services and all processes associated with the delivery of the Services, including the Sites, the Service Provider System and any ICT, information and data (including the Contracting Body Confidential Information) to the extent used by the Authority, the Contracting Body or the Service Provider in connection with this Framework Agreement. The Service Provider is responsible for monitoring and ensuring that it is aware of changes to the Security Policy Framework. The Service Provider shall keep the Security Management Plan up-to-date with the Security Policy Framework as amended from time to time. Development Within thirty (30) Working Days after the Commencement Date (or such other period specified in the Implementation Plan or as otherwise agreed by the Parties in writing) and in accordance with Paragraphs 3.3 and 3.4 below, the Service Provider shall prepare and deliver to the Authority and (if required by the Authority) the Pan-Government Accreditor for approval a fully complete and up-to-date Security Management Plan, relating specifically to the Services provided under this Framework Agreement. In this instance the “Pan Government Accreditor” refers to the service provided by CESG, the National Technical Authority for Information Assurance, concerned with effective management of information risk associated with adoption of pan-government shared services If the Security Management Plan or any subsequent revision to it in acc...
AutoNDA by SimpleDocs
Isms and Security Management Plan. 5.1 The Contractor shall develop an ISMS and a Security Management Plan which covers the End to End Solution.
Isms and Security Management Plan. Introduction The Contractor shall develop, implement, operate, maintain and continuously improve and maintain an ISMS which will, without prejudice to paragraph 2.2, be approved, by the Authority, tested in accordance with the schedule relating to testing procedures (if applicable), periodically updated and audited in accordance with ISO/IEC 27001. The Contractor shall develop and maintain a Security Management Plan in accordance with this Schedule to apply during the term of this Agreement. The Contractor shall comply with its obligations set out in the Security Management Plan. Both the ISMS and the Security Management Plan shall, unless otherwise specified by the Authority, aim to protect all aspects of the Services and all processes associated with the delivery of the Services, including the Authority’s premises, the Sites, the Contractor System and any information and communications technology, information and data (including the Authority Confidential Information and the Authority Data) to the extent used by the Authority or the Contractor in connection with this Agreement. Development Within 20 Working Days after the date of the contract to which these Supplementary Conditions apply and in accordance with paragraph (Amendment and Revision), the Contractor will prepare and deliver to the Authority for approval the full and final Security Management Plan which will be based on the draft Security Management Plan set out in Appendix 1. If the Security Management Plan, or any subsequent revision to it in accordance with paragraph 3.4, is approved by the Authority it will be adopted immediately and will replace the previous version of the Security Management Plan at Appendix 1. If the Security Management Plan is not approved by the Authority the Contractor shall amend it within [10] Working Days of a notice of non-approval from the Authority and re-submit to the Authority for approval. The parties will use all reasonable endeavours to ensure that the approval process takes as little time as possible and in any event no longer than [15] Working Days (or such other period as the parties may agree in writing) from the date of its first submission to the Authority. If the Authority does not approve the Security Management Plan following its resubmission, the matter will be resolved in accordance with any procedures for resolving disputes set out in the General Conditions. No approval to be given by the Authority pursuant to this paragraph of this schedule may...
Isms and Security Management Plan 

Related to Isms and Security Management Plan

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Project Management Plan 1 3.4.1 Developer is responsible for all quality assurance and quality control 2 activities necessary to manage the Work, including the Utility Adjustment Work.

  • Patch Management All workstations, laptops and other systems that process and/or 22 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 23 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 24 necessary. There must be a documented patch management process which determines installation 25 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 26 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 27 and systems that cannot be patched due to operational reasons must have compensatory controls 28 implemented to minimize risk, where possible.

  • Construction Management Plan Contractor shall prepare and furnish to the Owner a thorough and complete plan for the management of the Project from issuance of the Proceed Order through the issuance of the Design Professional's Certificate of Material Completion. Such plan shall include, without limitation, an estimate of the manpower requirements for each trade and the anticipated availability of such manpower, a schedule prepared using the critical path method that will amplify and support the schedule required in Article 2.1.5 below, and the Submittal Schedule as required in Article 2.2.3. The Contractor shall include in his plan the names and resumés of the Project Superintendent, Project Manager and the person in charge of Safety.

  • Management Plan The Management Plan is the description and definition of the phasing, sequencing and timing of the major Individual Project activities for design, construction procurement, construction and occupancy as described in the IPPA.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Programs and Services Every aspect of the service you provide is considered part of your program, and therefore it must be accessible to individuals with disabilities. This includes parking lots, service counters and spaces, transportation (shuttles, etc.), agendas, flyers, emails, online services, phone calls, meetings, celebrations, classes, recreational activities and more. The guidance in this document is primarily intended to help you provide accessible programs by providing you with the tools to: ▪ survey facilities and identify common architectural barriers for people with disabilities; ▪ identify common ADA compliance problems in your communications and activities; and ▪ remove barriers and fix common ADA compliance problems in these areas. ADA Technical Assistance Materials ADA Update Your programs can be broken into three main categories, (Communications, Facilities, and Activities) which will be covered in more detail below.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • FRAMEWORK AGREEMENT MANAGEMENT The Parties shall manage this Framework Agreement in accordance with Schedule 14 (Framework Management).

  • SITE MANAGEMENT We reserve the right, but not the obligation, to: (1) monitor the Site for violations of these Terms of Use; (2) take appropriate legal action against anyone who, in our sole discretion, violates the law or these Terms of Use, including without limitation, reporting such user to law enforcement authorities; (3) in our sole discretion and without limitation, refuse, restrict access to, limit the availability of, or disable (to the extent technologically feasible) any of your Contributions or any portion thereof; (4) in our sole discretion and without limitation, notice, or liability, to remove from the Site or otherwise disable all files and content that are excessive in size or are in any way burdensome to our systems; and (5) otherwise manage the Site in a manner designed to protect our rights and property and to facilitate the proper functioning of the Site.

Time is Money Join Law Insider Premium to draft better contracts faster.