Security Classification Sample Clauses

Security Classification. The information shared through this agreement will be marked in accordance with the Government Security Classification (GSC) and information to be shared will not exceed the level of Official Sensitive.
AutoNDA by SimpleDocs
Security Classification. A marking applied to protected information in order to indicate minimum standards of protection which need to be applied in the national interest. Security Target: implementation-dependent statement of security needs for a specific identified Target of Evaluation Shadow certification: Assessment of a CB in which representatives of at least two Qualified Participants monitor the evaluation and certification of an IT product in accordance with this Agreement.
Security Classification. Any anticipated sensitivities of the data set or security implications of the dataset need to be documented and agreed to by SCAG before data collection or acquisition begins. This applies to general sensitivity issues and not strictly national security classification systems. For example, SCAG needs to know that the data being collected is sensitive to the extent that it should not be displayed at large scales on the Internet.
Security Classification. Any restrictions imposed by national security concerns. Must be agreed upon before data acquisition. SCAG will accept non-traditional evaluations of confidentiality that a contractor may deem appropriate. A dataset for example may be classified “may be inappropriate for display on Internet at large scales.” These evaluations are for security concerns not data quality concerns. (Required)
Security Classification. The Callmy Alert SOS service holds and process information to the OFFICIAL level of security classification.
Security Classification. The information provided to the contractor will be unclassified and/or Controlled Unclassified Information (CUI). Certain contractors will be required to perform IT-I/II duties that will require favorably adjudicated Tier 5/3 Level investigations. The Defense Security Service (DSS) will not authorize Contractors to submit the necessary Tier Level investigations solely in support of IT level designation requirements, without a valid classified requirement as specified in a DD254. This effort does not warrant a DD Form 254, therefore the Government Contracting Activity Security Office (GCASO) will be required to submit any required investigations in support of IT level designations. The Contractor will be required to provide a roster of prospective contractor employees performing IT Level II and/or IT Level I duties to the MCSC COR. This roster must include: full names, Social Security Numbers, IT Level required, e-mail address and phone number. The COR will verify the IT Level requirements and forward the roster to the GCASO. Contractors found to be lacking required investigations will be contacted by the GCASO.
Security Classification. 6.5.1 An Annex or Appendix can require a different security classification from its master document. Example: The Annex to a document requires a security classification of PROTECTED but the covering letter is UNCLASSIFIED.
AutoNDA by SimpleDocs
Security Classification. State security classification Supporting services are listed below:
Security Classification. The contract classification will be OFFICIAL The maximum classification of information processed or stored under the contract will be OFFICIAL Security Provisions Prior to contract award there may be the requirement for a security assurance visit. The Funder retains the right to carry out assurance visits of the contractor's premises in order to confirm that these security requirements are being met.
Security Classification. The information shared through this agreement will be marked in accordance with the Government Security Classification (GSC) and information to be shared will not exceed the level “Official Sensitive”. For example, information must not be shared if:  Cause substantial distress to individuals  Prejudice the investigation or facilitate the commission of crime  Breach proper undertakings to maintain the confidence of information provided by third parties  Breach statutory restrictions on disclosure of information (except the Data Protection Act 1998)  Disadvantage government or Partners in commercial or policy negotiations with others 1 Report on the review of patient-identifiable information, Caldicott Committee, 1997, xxxx://xxx.xxxxx.xxx.xx/sites3/Documents/950/DH_4068404.pdf
Time is Money Join Law Insider Premium to draft better contracts faster.