System Security Considerations Clause Samples

System Security Considerations. General Information/Data Description. The interconnection between the NV and/or NLAD pre-production and production environment servers and the SERVICE PROVIDER servers, owned by SERVICE PROVIDER, is a two-way path. The requirements for interconnection between USAC and SERVICE PROVIDER are for the express purpose of exchanging data between the two systems to verify that the applicant is currently eligible and/or does not already receive the federal Lifeline program benefit or the EBB program benefit.
System Security Considerations. The integration data traversing this interconnection is classified as Sensitive-but-Unclassified (SBU). SSL will be used to encrypt the data during transmission and system generated access key is used to restrict others accessing the service. This ensures that security levels and types of encryption considered adequate or acceptable to both the SASP and GSA will always be used over the connection to protect all user credentials and data that traverses this connection. The integration data traversing this interconnection is classified as Sensitive-but-Unclassified. The Excess Property data contains sensitive data that must be protected by both GSAXcess® and SASP systems against disclosure, corruption, and unavailability. Excess Property data will traverse this connection. Though the data classification is Sensitive-But- Unclassified (SBU), its sensitivity demands strong measures to provide a high level of confidence that its confidentiality, integrity, and availability are preserved. GSA security policy requires that all system interconnections use a secured method of communication. [For batch customers who use Web Services, the systems shall use HTTPS and SOAP for connection and data transmission. The GSAXcess® system is expected to protect data in accordance with the policies and standards of the Privacy Act, OMB A-130, and GSA.
System Security Considerations. [Use this section to document the security features that are in place to protect the confidentiality, integrity and availability of the data and the systems being interconnected. The technical representative from each organization will need to discuss the contents on this section to come to a mutual agreement as to which items are to be included. Both parties must answer each item even if the subjected item is affecting only one party. Note that some items are required with others are optional. Optional items affecting only one system will be answered and included.] [REQUIRED ITEMS. Note: Do not include the title "Required Items" in the actual ISA. Read the instruction in "ISA Procedure" before deciding how to answer the following questions. The following items must be included and answered in the ISA.]
System Security Considerations