Security CONTRACTOR must have documented and implemented security practices for the following and have Sample Clauses

Security CONTRACTOR must have documented and implemented security practices for the following and have a process to audit/monitor for adherence. S1 Authentication and password management Scout Enterprise can authenticate using Scout Enterprise based authentication or Active Directory authentication. A static analysis audit was executed on the Scout Enterprise source code in a non-runtime environment to discover potential coding vulnerabilities (e.g. SQL injection, OS command injection, buffer overflow, cross-site scripting, path traversal, incorrect buffer size, etc.) S2 Access control Scout Enterprise can be configured for role-based access for End-Users and Administrators. A static analysis audit was executed on the Scout Enterprise source code in a non-runtime environment to discover potential coding vulnerabilities (e.g. SQL injection, OS command injection, buffer overflow, cross-site scripting, path traversal, incorrect buffer size, etc.) S3 Cryptographic practices Encryption in Scout Enterprise includes the process of transforming clear audio to encoded audio to send to the field and the reverse, transforming encrypted audio to clear audio to present to the dispatcher. As another example, if two subscriber units engage in an encrypted conversation and the dispatcher is monitoring the group's conversation, Scout Enterprise decrypts audio for the dispatcher to understand. Scout Enterprise offers software-based encryption for Project 25 (P25) radios as well as for the following Motorola MOTOTRBO™ radio technologies: MOTOTRBO™ Connect Plus, MOTOTRBO™ Multi-Site Capacity Plus, MOTOTRBO™ IP Site Connect, and MOTOTRBO™ Capacity Max. A static analysis audit was executed on the Scout Enterprise source code in a non-runtime environment to discover potential coding vulnerabilities (e.g. SQL injection, OS command injection, buffer overflow, cross-site scripting, path traversal, incorrect buffer size, etc.) S4 Error handling and logging Scout Enterprise components have application log files that can be utilized for diagnostics. Scout Enterprise Components also can report alarm conditions to a central component for day to day management of the system. A static analysis audit was executed on the Scout Enterprise source code in a non-runtime environment to discover potential coding vulnerabilities (e.g. SQL injection, OS command injection, buffer overflow, cross-site scripting, path traversal, incorrect buffer size, etc.) S5 Data protection from unauthorized use, modification, disclosure or destruction (accidental or intentional). Scout Enterprise customers should us...
AutoNDA by SimpleDocs

Related to Security CONTRACTOR must have documented and implemented security practices for the following and have

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • CHILD AND DEPENDENT ADULT/ELDER ABUSE REPORTING CONTRACTOR shall establish a procedure acceptable to ADMINISTRATOR to ensure that all employees, agents, subcontractors, and all other individuals performing services under this Agreement report child abuse or neglect to one of the agencies specified in Penal Code Section 11165.9 and dependent adult or elder abuse as defined in Section 15610.07 of the WIC to one of the agencies specified in WIC Section 15630. CONTRACTOR shall require such employees, agents, subcontractors, and all other individuals performing services under this Agreement to sign a statement acknowledging the child abuse reporting requirements set forth in Sections 11166 and 11166.05 of the Penal Code and the dependent adult and elder abuse reporting requirements, as set forth in Section 15630 of the WIC, and shall comply with the provisions of these code sections, as they now exist or as they may hereafter be amended.

  • Required Procurement Procedures for Obtaining Goods and Services The Grantee shall provide maximum open competition when procuring goods and services related to the grant-assisted project in accordance with Section 287.057, Florida Statutes.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Georgia Security and Immigration Compliance Act Requirements No bid will be considered unless the Contractor certifies its compliance with the Immigration reform and Control Act of 1986 (IRCA), D.L. 99-603 and the Georgia Security Immigration Compliance Act OCGA 13-10-91 et seq. The Contractor shall execute the Georgia Security and Immigration Compliance Act Affidavit, as found in Section 7 of the Construction Contract. Contractor also agrees that it will execute any affidavits required by the rules and regulations issued by the Georgia Department of Audits and Accounts. If the Contractor is the successful bidder, contractor warrants that it will include a similar provision in all written agreements with any subcontractors engaged to perform services under the Contract.

  • Personnel Requirements and Documentation Grantee will;

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Procurement and Property Management Standards The parties to this Agreement shall adhere to the procurement and property management standards established in 2 CFR 200, Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards, and to the Texas Uniform Grant Management Standards. The State must pre-approve the Local Government’s procurement procedures for purchases to be eligible for state or federal funds.

Time is Money Join Law Insider Premium to draft better contracts faster.