Rules of Behavior Sample Clauses

Rules of Behavior. The Contractor shall ensure that all employees, including subcontractor employees, comply with the NIH Information Technology General Rules of Behavior (xxxxx://xxxx.xxx.xxx/InfoSecurity/training/Pages/nihitrob.aspx), which are contained in the NIH Information Security Awareness Training Course xxxx://xxxxxxxxxxxxxx.xxx.xxx.‌‌‌‌‌‌‌ (Include subparagraph 3 below if the delivery order includes the Clause at HHSAR 352.239-72, Security Requirements for Federal Information Technology Resources.)
AutoNDA by SimpleDocs
Rules of Behavior. ‌ Users are bound by USDA policy and guidelines. USDA employees and contractors are required to complete the annual USDA Security Awareness Training and pass a background investigation. The system security controls must be enforced, and audit logging must be enforced. No new or additional security awareness or training requirements are needed as a result of implementing the interconnections between the systems identified in this agreement. All users and administrators are expected to protect the information transmitted in accordance with all required laws, regulations, and NIST guidance. Both parties agree to work together to ensure the joint security of the connected systems and the data they store, process, and transmit. Each party certifies that its respective system is designed, managed, and operated in compliance with all relevant agency regulations, official guidance, and policies. As part of assuring this compliance for the security and benefit of each partner organization, thorough review of each system’s SSPs, has been performed.
Rules of Behavior. CMS shall:  Ensure that all CMS system users with access to the CMS Network shall adhere to all current HHS Rules of Behavior.11 The Non-CMS Organization shall:  Require that all users with access to the Non-CMS Organization’s system and its connection with the Hub, adhere to the terms of this ISA and the EDE Agreement executed between the Non-CMS Organization and CMS.  Require the Non-CMS Organization’s Rules of Behavior provide protections that are commensurate with current HHS Rules of Behavior.
Rules of Behavior. If You purchase Xxxxxx’s FedRAMP SaaS Environment then You, along with Your system administrators, employees, contractors, end-users, and other third parties who are given access to the FedRAMP SaaS Environment, are subject to the FedRAMP Rules of Behavior located at xxxx://xxx.xxxxxx.xxx/company/legal/fedramp.
Rules of Behavior. Rules of Behavior are part of a comprehensive program to provide complete information security. These guidelines were established to hold users accountable for their actions and responsible for information security. Rules of Behavior establish █HH█UU█DD█--22█55█2222█288█((█0055█//22█00█222█2)) standards of behavior in recognition of the fact that knowledgeable users are the foundation of a successful security program. Users need to understand that taking personal responsibility for the security of their computer and the data it contains is an essential part of their job.
Rules of Behavior. 1) The Contractor (and/or any subcontractor) shall ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior.
Rules of Behavior. According to the conditions of stay in the Center, during the recovery course, the CLIENT is strictly forbidden:
AutoNDA by SimpleDocs
Rules of Behavior. Both parties shall ensure that all users with access to the CMS Network, the CMS information system, the Non-CMS Organization network and any data received from the other organization shall adhere to all current HHS Rules of Behavior (RoB) (For Use of Technology Resources and Information), which is available at xxxxx://xxx.xxx.xxx/Research-Statistics-Data-and-Systems/CMS-Information-Technology/InformationSecurity/Info-Security-Library-Items/HHS-Rules-of-Behavior-for-Use-of-HHS-Information-and-IT-Resources-Policy.html?DLPage=1&DLEntries=10&DLFilter=rule&DLSort=0&DLSortDir=ascending
Rules of Behavior. EGS and <<VENDOR SYSTEM>> users are expected to protect data in accordance with the policies and standards of the Privacy Act, OMB A-130 and each systems prospective Rules of Behavior document.
Rules of Behavior. Reference: NIST 800-53 control PL-4 The Contractor shall define and establish Rules of Behavior for information system users. Rules of Behavior shall be submitted to the GSA CO and COR as an appendix to the System Security Plan thirty (30) calendar days after award and then on the 15th of the month following the end of each 12 month period.
Time is Money Join Law Insider Premium to draft better contracts faster.