ICT security definition
Examples of ICT security in a sentence
This includes the strategic planning, architecture and ongoing management of the WA health system’s ICT network, applications and infrastructure, provision of ICT support to WA health system customers and the management of ICT security and risk (including security of patient data).
Any data users export or print must be stored in a secure location and in full compliance with the General Data Protection Regulation as well as with the user’s own data protection and ICT security policies.
Financial entities shall develop ICT security awareness programs and digital operational resilience trainings as compulsory modules in their staff training schemes.
Financial entities other than microenterprises shall monitor relevant technological developments on a continuous basis, also with a view to understand possible impacts of deployment of such new technologies upon the ICT security requirements and digital operational resilience.
Financial entities shall design, procure and implement ICT security strategies, policies, procedures, protocols and tools that aim at ensuring the resilience, continuity and availability of ICT systems, in particular for those supporting critical or important functions, and maintaining high standards of confidentiality, integrity and availability of data, whether at rest, in use or in transit.
For the purposes of adequately protecting the ICT systems and with a view to organising response measures, financial entities shall continuously monitor and control the security and functioning of the ICT systems and tools and shall minimise the impact of such ICT risks through the deployment of appropriate ICT security tools, policies and procedures.
The Supplier shall appoint a representative with responsibility for ensuring full compliance with all ICT systems technical security measures used in connection with the performance of the Services, and shall liaise with the Contracting Authority's security representatives on ICT security matters to ensure that the security counter-measures proposed in the system design and system development are adequate.
All suspected or actual breaches of ICT security shall be reported to the School ICT Manager or the Head teacher who should ensure a speedy and effective response to be made to an ICT security incident, including securing useable evidence of breaches and evidence of any weakness in existing security arrangements.
Suspicious activity and observed security breaches must be reported as non-conformities to your line manager and/or the ICT security manager as soon as possible.
Provide technical support and advice in the design, implementation and management of ICT security services for WA Health including firewalls, intrusion prevention, network administration, virus protection, security information and event management, forward and reverse proxy, DNS, remote access, e-mail gateways and Internet services.