System Security Review. User must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing DOM data must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools. A system risk assessment/security review must be done if a change to the boundaries of the system has occurred before the annual system risk assessment/security review is scheduled to be performed.
Appears in 5 contracts
Samples: Data Use Agreement, rfps.its.ms.gov, Data Use Agreement
System Security Review. User must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing DOM data must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools. A system risk assessment/security review must be done if a change to the boundaries of the system has occurred before the annual system risk assessment/security review is scheduled to be performed.
Appears in 1 contract
Samples: Data Use Agreement