Security Operations Sample Clauses

Security Operations the IS function manages support of implemented security solutions, monitors and scans the environment and assets, and manages incident response.
AutoNDA by SimpleDocs
Security Operations. CONTRACTOR shall provide all Security Operations in accordance with ACA Standards, and the FDC’s security procedures only to such extent as it is not in direct conflict with ACA Standards. CONTRACTOR shall provide a Security Operations Plan to the On-Site Contract Monitor prior to the Service Commencement Date. The plan shall be reviewed annually and updated as needed. Documentation of this review shall be provided annually to the On-Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.
Security Operations manages support of implemented security solutions, monitors and scans the environment and assets, and manages incident response.
Security Operations. 38.1 The City and the UNION and its officers, agents and members recognize there are assignments within the Miami Police Department where security of information is an absolute necessity. Therefore, the Chief of Police at his sole discretion may reject an employee to such assignment within the Miami Police Department when the Chief has reason to believe that there is potential for the Security of the Department to be compromised.
Security Operations. Xxxxx XxXxxxxxx Information System Security Officer (ISSO) District 2, Southern Territory Service OperationsEnterprise Security Operations 0000 Xxxxxxx Xxxxx Xxxx Columbia, SC 29209 Telephone: (000) 000-0000 Email: Xxxxx.XxXxxxxxx@xx.xxx
Security Operations. Manager shall manage and implement security services at the ARTIC Site.
Security Operations i. Provide internet services and support which include Internet address management, web caching, content filtering, bandwidth management, Internet authentication, firewall service, and Virtual Private Network Management
AutoNDA by SimpleDocs
Security Operations a) The system shall be hardened, which means that: • only the services and network ports necessary for efficient operation are up and running • all application code is patched and kept up to date and • limiting the accounts and removing, changing or disabling default accounts and passwords Note: In order to ensure proper risk driven methodology is followed, patches shall fall into one of the following categories, which are classified by the application / system vendor.; critical, noncritical. The patching window SLA, shall be formally documented by both vendor and UNICEF’s Designated Authority (D.A.).
Security Operations. Supplier shall maintain operational security policies, procedures, and controls in accordance with industry standard practices. At a minimum, such policies and procedures shall cover and such controls shall include: (i) ensuring Buyer Information is logi- cally and/or physically segregated; (ii) firewalls; (iii) network intrusion detection; (iv) regularly updated anti-virus software; (v) application of security patches in accordance with industry standards; (vi) commercially reasonable vulnerability scans; (vii) continuously assessing and tracking vulnerabilities on network assets; (viii) monitoring for unauthorized access, within Supplier’s network and/or applications, to ensure that unauthorized persons, computers, computer programs or networks do not have access to or use of Buyer Information; (ix) an annual penetration test of Supplier’s key systems and applications carried out by an independent third-party; (x) collecting, alerting, and reviewing audit logs of events that could help detect, understand, or recover from an adverse event; (xi) protect and detect against threats from email and web vectors, and (xii) monitoring public and private industry sources for new threat and vulnerability information. Upon request, Supplier shall provide a copy of the penetration test results to Buyer.
Security Operations. Information Sharing Establish formal liaison with law enforcement and implement procedures for receiving and disseminating threat information. Training Conduct new employee security awareness training. Conduct and maintain records of annual security awareness training. Security Management Designate a knowledgeable security professional to manage security of the facility. Ensure subOfferor compliance with BARDA security requirements.
Time is Money Join Law Insider Premium to draft better contracts faster.