ICT security definition

ICT security means protecting information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity and availability;
ICT security means protecting information system from unauthorized access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability of information system;

Examples of ICT security in a sentence

  • This includes the strategic planning, architecture and ongoing management of the WA health system’s ICT network, applications and infrastructure, provision of ICT support to WA health system customers and the management of ICT security and risk (including security of patient data).

  • Any data users export or print must be stored in a secure location and in full compliance with the General Data Protection Regulation as well as with the user’s own data protection and ICT security policies.

  • Financial entities shall develop ICT security awareness programs and digital operational resilience trainings as compulsory modules in their staff training schemes.

  • Financial entities other than microenterprises shall monitor relevant technological developments on a continuous basis, also with a view to understand possible impacts of deployment of such new technologies upon the ICT security requirements and digital operational resilience.

  • Financial entities shall design, procure and implement ICT security strategies, policies, procedures, protocols and tools that aim at ensuring the resilience, continuity and availability of ICT systems, in particular for those supporting critical or important functions, and maintaining high standards of confidentiality, integrity and availability of data, whether at rest, in use or in transit.

  • For the purposes of adequately protecting the ICT systems and with a view to organising response measures, financial entities shall continuously monitor and control the security and functioning of the ICT systems and tools and shall minimise the impact of such ICT risks through the deployment of appropriate ICT security tools, policies and procedures.

  • The Supplier shall appoint a representative with responsibility for ensuring full compliance with all ICT systems technical security measures used in connection with the performance of the Services, and shall liaise with the Contracting Authority's security representatives on ICT security matters to ensure that the security counter-measures proposed in the system design and system development are adequate.

  • All suspected or actual breaches of ICT security shall be reported to the School ICT Manager or the Head teacher who should ensure a speedy and effective response to be made to an ICT security incident, including securing useable evidence of breaches and evidence of any weakness in existing security arrangements.

  • Suspicious activity and observed security breaches must be reported as non-conformities to your line manager and/or the ICT security manager as soon as possible.

  • Provide technical support and advice in the design, implementation and management of ICT security services for WA Health including firewalls, intrusion prevention, network administration, virus protection, security information and event management, forward and reverse proxy, DNS, remote access, e-mail gateways and Internet services.

Related to ICT security

  • Contract Security means any security given by the Contractor to the NCC in accordance with the Contract;

  • Exempt Security means any: (1) direct obligation of the Government of the United States, including all state and municipal obligations; (2) bankers’ acceptance, bank certificate of deposit, commercial paper, bank repurchase agreement and other high quality short-term debt instrument; (3) shares issued by registered open-end mutual funds (including money-market funds) and unit investment trusts, in each case provided they are not Reportable Funds or ETFs (as such terms are defined herein); and (4) Securities in an account over which you do not have any direct or indirect influence or Control (note that there is a presumption that you can exert some measure of influence or control over accounts held by members of your immediate family sharing the same household, but this presumption may be rebutted by convincing evidence acceptable to the Chief Compliance Officer in accordance with this Code);

  • Relevant Security means the Stock, any other equity security of the Company or any of its subsidiaries and any security convertible into, or exercisable or exchangeable for, any Stock or other such equity security.

  • LCR Security means any commercial paper or security (other than equity securities issued to Parent or any Originator that is a consolidated subsidiary of Parent under GAAP) within the meaning of Paragraph __.32(e)(viii) of the final rules titled Liquidity Coverage Ratio: Liquidity Risk Measurement Standards, 79 Fed. Reg. 197, 61440 et seq. (October 10, 2014).

  • Bid Security means the bid security provided by the Contractor to the Authority in accordance with the Request for Proposal, and which is to remain in force until substituted by the Performance Security;