SSA Permitted Entity Security Posture Sample Clauses

SSA Permitted Entity Security Posture. Prior to the redisclosure of NDNH information by SSA to any authorized entity, SSA shall demonstrate, and OCSE shall review and approve, the security posture of the entity’s systems and processes. All information systems and applications that process, transmit, or store NDNH information shall be fully compliant with FISMA, OMB directives, and NIST guidelines. Prior to receiving NDNH information, entities shall have implemented the minimum security controls required for a system categorized as “moderate” in accordance with FIPS 199. All systems and applications handling NDNH information shall first be granted the ATO through the authorization process according to NIST SP 800-37 Revision 2. In addition, if applicable, federal agencies that share NDNH information with entities specified in the agreement shall ensure the specified contractors meet the same safeguarding requirements. The authorizing official of the agency that re-discloses NDNH information to the permitted entity may grant them the ATO or security authorization. The security authorization process shall have been conducted according to the NIST SP 800- 37 Revision 2 as appropriate. Federal agencies shall comply with NIST SP 800-37 Revision 2, including implementing a continuous monitoring program for permitted entities. Agencies shall conduct the authorization process at least every three years or when there are major changes to a system. Agencies must verify privacy protection periodically through audits and reviews of the systems and procedures. By signing the security addendum, SSA signatories confirm that SSA has reviewed the entities specified in the agreement, reviewed the security controls in place to safeguard information and information systems, and determined that the risk to federal data is at an acceptable level. The security controls in place at all entities specified in the agreement are commensurate with those of a federal system categorized as “moderate” according to FIPS 199. See also XXX X-00-00, Fiscal Year 2018-2019 Guidance on Federal Information Security and Privacy Management Requirements, October 25, 2018.
AutoNDA by SimpleDocs

Related to SSA Permitted Entity Security Posture

  • Permitted License Uses and Restrictions (a) This Order Form Supplement allows you, as an authorized User under the Master Subscription Agreement, to use the Software on any Supported Device and on no other devices.

  • Required Liability Insurance; Personal Property During the full term of the Housing Agreement, Resident agrees to obtain and maintain at Resident’s expense a policy of personal liability insurance (i.e., renter’s liability insurance) from a licensed insurance carrier in the United States, with coverage of at least $100,000 per occurrence at actual replacement cost, covering Owner’s losses of any kind arising from fire, smoke or water and caused by Resident’s negligence and/or by Resident’s animal. The liability insurance requirement and the existence or limits of any such insurance will not reduce or supersede Resident’s obligations under this Housing Agreement, except to the extent Owner charges and Resident pays for a waiver of this insurance requirement as provided below. Resident is not obligated to purchase insurance from any specific provider and may arrange its own personal liability insurance policy from any insurer of Resident’s choosing meeting the requirements of this paragraph, in which case Resident agrees to provide written proof of the required personal liability insurance coverage, including causing Owner and Manager to be listed as named interested parties on such insurance coverage, by mailing the proof of insurance to P.O. Box 18999, Atlanta, GA 31126-1399. Owner will provide instructions prior to move-in for submitting proof of insurance or purchasing a compliant insurance policy; Resident’s failure to comply with these insurance requirements will be a breach by Resident with Owner reserving its remedies but will not give Resident any right of termination. If Resident fails or chooses not to provide sufficient proof of compliant personal liability insurance to Owner by the Start Date, or if Resident’s insurance is cancelled during the term of this Housing Agreement, then Owner may, at its option, waive Resident’s obligation to provide such insurance and obtain its own coverage in Owner’s name for the same limited risks (up to $100,000 per occurrence from fire, smoke or water damage caused accidentally by Resident’s negligence and/or by Resident’s animal) at Owner’s expense; in such case, Resident agrees to pay as consideration for this waiver to $15.00 per installment as additional Rent during the remaining term of this Agreement, of which Owner would retain up to $5.00 per installment as an administrative fee and use the remaining portion to procure such insurance for itself. This waiver is not insurance, does not release Resident from liability for other damage or causes and does not cover Resident’s personal property. Owner strongly recommends that Resident maintain insurance covering Resident’s personal property or belongings, which Resident may elect to purchase. Neither Owner nor any of its employees, representatives or agents assumes any liability, directly or indirectly, for loss or damage to the personal property of Resident or others by fire, theft or any other cause. Any personal property remaining in the bedroom space and/or apartment at the end of the Term or after earlier termination of this Agreement will be considered abandoned by Resident and may be disposed of by Owner at the risk and expense of Resident, with Owner maintaining a landlord’s lien for unpaid rent as provided by law. Owner will not be liable or responsible for storage or disposition of the Resident’s personal property. If there are multiple individuals comprising Resident, then all references to and obligations of Resident in this paragraph 8 will apply to each such individual, separately.

  • Utilisations permises de la licence et restrictions A. Licence de logiciel Apple préinstallé ou copie unique. Sous réserve des conditions générales de cette Licence, et à moins que vous ayez acquis le logiciel Apple dans le Mac App Store, par le biais d’un téléchargement automatique ou dans le cadre d’une licence ou maintenance de volume ou tout autre accord écrit passé avec Apple, une licence de non-exclusivité limitée vous est accordée pour installer, utiliser et exécuter un (1) seul exemplaire du logiciel Apple sur un seul ordinateur Apple à la fois. Par exemple, les termes de la présente Licence à copie unique s’appliquent à vous si vous avez acquis le logiciel Apple préinstallé sur un matériel de marque Apple.

  • Permitted License Transfers As Licensee’s business operations may be altered, expanded or diminished, licenses granted hereunder may be transferred or combined for use at an alternative or consolidated site not originally specified in the license, including transfers between Agencies (“permitted license transfers”). Licensee(s) do not have to obtain the approval of Contractor for permitted license transfers, but must give thirty (30) days prior written notice to Contractor of such move(s) and certify in writing that the Product is not in use at the prior site. There shall be no additional license or other transfer fees due Contractor, provided that: i) the maximum capacity of the consolidated machine is equal to the combined individual license capacity of all licenses running at the consolidated or transferred site (e.g., named users, seats, or MIPS); or ii) if the maximum capacity of the consolidated machine is greater than the individual license capacity being transferred, a logical or physical partition or other means of restricting access will be maintained within the computer system so as to restrict use and access to the Product to that unit of licensed capacity solely dedicated to beneficial use for Licensee. In the event that the maximum capacity of the consolidated machine is greater than the combined individual license capacity of all licenses running at the consolidated or transferred site, and a logical or physical partition or other means of restricting use is not available, the fees due Contractor shall not exceed the fees otherwise payable for a single license for the upgrade capacity.

  • State Approval of Replacement Personnel The Engineer may not replace the project manager or key personnel without prior consent of the State. The State must be satisfied that the new project manager or other key personnel is qualified to provide the authorized services. If the State determines that the new project manager or key personnel is not acceptable, the Engineer may not use that person in that capacity and shall replace him or her with one satisfactory to the State within forty-five (45) days.

  • Coverage C – Personal Property We insure for direct physical loss to the property described in Coverage C caused by any of the following perils unless the loss is excluded in Section I – Exclusions.

  • Facility Security Clearance (FSC) The Contractor shall maintain or exceed their FSC and submit updates, if applicable

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Pre-Existing Intellectual Property Each Party shall retain ownership of its respective Pre-Existing Intellectual Property. The Contractor grants the State a perpetual, irrevocable, non-exclusive, royalty free license for Contractor’s Pre-Existing Intellectual Property that are incorporated in the products, materials, equipment, deliverables, or services that are purchased through the Contract.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

Time is Money Join Law Insider Premium to draft better contracts faster.