System Security Requirements Clause Samples
POPULAR SAMPLE Copied 1 times
System Security Requirements. Contractor shall, in cooperation with CSD, institute policies, processes, procedures, and security controls designed to ensure the security of data and to protect information in accordance with the Information Practices Act of 1977 (Civ. Code §§ 1798 et seq.), and such other State and federal laws and regulations as may apply. The parties hereto agree to requirements, obligations, and standards in accordance with regulations set in the State Administrative Manual (▇▇▇) and Statewide Information Management Manual (SIMM). In the event there are different system security standards that may be applied to this Article, Contractor shall endeavor to use the strictest security standard that complies with state and federal requirements.
System Security Requirements. If the Contractor becomes aware of any unauthorized access to an agency’s Confidential Information or a security breach that compromises or reasonably could compromise an agency’s Confidential Information (an “incident”), the Contractor shall take appropriate immediate actions to contain the incident, in accordance with applicable law, and notify the Ordering Entity as soon as reasonably possible. The Contractor shall provide the Ordering Entity with information regarding any incident as may be reasonably requested by the Ordering Entity and that is in the Contractor’s possession, custody, or control at the time a request is received. Upon request of the Government, the Contractor will reasonably cooperate with the Government to investigate the nature and scope of any incident and to take appropriate actions to investigate and otherwise respond to the incident or associated risks. (As used in this Section, “compromise” means that the information has been exposed to any unauthorized access, inadvertent disclosure, known misuse, or known loss, alteration or destruction of Confidential Information other than as required to provide the services.)
System Security Requirements. The Alabama Department of Revenue does not prescribe the security requirements for your system. You are responsible for implementing appropriate security measures to protect taxpayers and their information in your system. You must apply security measures to protect taxpayer information in your system when it is on-line, off-line, at rest, and in transit. All e-file ATS and substitute forms tests submitted during the approval process must be created in, and originate from, the actual software.
System Security Requirements. The Alabama Department of Revenue does not prescribe the security requirements for your system. You are responsible for implementing appropriate security measures to protect taxpayers and their information in your system. You must apply security measures to protect taxpayer information in your system when it is on-line, off-line, at rest, and in transit. Unless otherwise prohibited by law, all data breaches, security incidents, or other improper disclosures of taxpayer data must be promptly reported to the Alabama Department of Revenue and Alabama Attorney General Office. Data breaches, security incidents, or other improper disclosures of taxpayer data that by law require reporting to the Alabama Attorney General Office must also be reported to the Alabama Department of Revenue.
System Security Requirements. COUNTY shall implement security procedures to prevent unauthorized physical access to sensitive voting equipment. The ▇▇▇▇ Voting and Voter Management System shall include and support operational features to prevent both inadvertent and deliberate operations that could result in the disruption of the election process and corruption of election administrative and voting data.
System Security Requirements. 4.1 National and DOD security requirements
4.2 Governing security requisites
4.3 Data Security Requirements
System Security Requirements. 15.1. All Services provided by Bank under this Agreement whether implemented in the state of Washington on State computer systems and networks or on Bank’s systems, must be compliant with the applicable security policy and standards of the Office of the Chief Information Officer (OCIO). The OCIO Security Policy is available at: ▇▇▇▇://▇▇▇.▇▇.▇▇▇/ocio/policies/documents/141.pdf. The OCIO Security Standards are available at: ▇▇▇▇://▇▇▇.▇▇.▇▇▇/ocio/policies/documents/141.10.pdf.
15.2. The Bank will be required to represent and warrant that it will comply with all applicable elements of the OCIO Security Policy and the OCIO Security Standards in its performance of any Services awarded under an Agreement. The Bank will be required to comply with ESD Security Policy and must receive annual Information Technology (IT) security awareness training either from their company, or through the LCB Annual Security Training.
System Security Requirements. Contractor shall utilize tamper-resistant PV module to rack fasteners for all PV module mounting. Contractor shall utilize tamper-resistant fasteners for all electrical fittings, pull boxes and other enclosures. Contractor shall supply and install Utility approved a Net Generation Output Meter (NGOM) for each PV system. Generation Meters shall use Internet Protocol (IP) communication and shall not require a custom network for connection. Generation Meters shall have the capability to store metered data including instantaneous kW, kWh, voltage, current, and phase information) in fifteen (15) minute intervals and retain such information for at least seven (7) Calendar Days. Contractor shall design, build, activate and ensure proper functioning of Data Acquisition Systems (DAS) that enable the City to track the performance of the PV Systems as well as environmental conditions through an online web-enabled graphical user interface and information displays. Contractor shall provide equipment to connect the DAS via existing Wi-Fi network or cellular data network at all locations. The means of data connection will be determined during design. The City will pay for the cost of cellular data service if needed, and the Contractor shall pay for the modem and/or other equipment needed to connect to the cellular network. The DAS(s) shall provide access to at least the following data: Instantaneous AC system output (kW) PV System production (kWh) over pre-defined intervals that may be user configured AC and DC voltage Horizontal and in-plane irradiance (at least three (3) sensors for each, at different positions in the array) Ambient and back-of-cell temperature (at least two (2) sensors for each, at different positions in the array) Inverter status flags and general system status information System availability Site Load information. Available load data for the meter the system is connected to shall be collected by the solar monitoring solution as part of the DAS. Environmental data such as temperatures, wind speed, and irradiance shall be collected via an individual weather station installed for each system at each site where PV is being installed. Data collected by the DAS shall be presented in an online web interface, accessible from any computer through the Internet with appropriate security (i.e., password-controlled access). The user interface shall allow visualization of the data at least in the following increments: 15 minutes, hour, day, week, month, and year....
System Security Requirements. Contractor shall, in cooperation with CSD, institute measures, procedures, and protocols designed to ensure the security of data and to protect information in accordance with the Information Practices Act of 1977 (Civ. Code § 1798 et seq.), and such other State and Federal laws and regulations as may apply. In the event there are different system security standards that may be applied to this Article, Contractor shall endeavor to use the strictest security standard that complies with state and federal requirements. The parties hereto agree to the following requirements, obligations, and standards in accordance with regulations set in the State Administrative Manual (▇▇▇) and Statewide Information Management Manual (SIMM):
A. Data Protection 1. Data exchanged between CSD and Contractor must be limited to the data fields included on Data Transfer Rules documents posted at ▇▇▇▇▇://▇▇▇▇▇▇▇▇.▇▇▇.▇▇.▇▇▇/home/Energy/Pages/Resources.aspx. No personal financial information, e.g., credit card, bank account numbers, shall be stored or exchanged in the data exchange sessions.
