Information Security Handbook definition
Examples of Information Security Handbook in a sentence
Contractor employees are held to the same standard as Federal employees and must abide by the USDA rules of behavior as presented in the annual training and will follow Title 270 – National Information Security Handbook, Part 602 – Internet Usage and E-Mail Guidelines on computer personal use.
Confidential information shall also mean and include collectively, as per The Port Authority of New York & New Jersey Information Security Handbook (October 15, 2008, corrected as of February, 9 2009), Confidential Proprietary Information, Confidential Privileged Information and information that is labeled, marked or otherwise identified by or on behalf of the Authority so as to reasonably connote that such information is confidential, privileged, sensitive or proprietary in nature.
Policy documents that govern the protection of the data are U.S. CBP Customs Information Security Handbook (CIS HB) (HB 1400-05D), and Department of Homeland Security (DHS) –4300A Sensitive Systems Policy.
I understand and agree that my use of University Information Resources is conditioned upon my agreement to comply with the policy and that my failure to comply with this policy, including the MSU Information Security Handbook, may result in access and usage loss, disciplinary action up to and including termination of my employment, criminal prosecution, civil litigation, and fines.
Service Provider further agrees to comply with the controls established in the UNT System Information Security Handbook, as applicable, to ensure the confidentiality, integrity, and availability of the information or information processing provided, including providing evidence that information/data stored is recoverable and contingency plans are in place.
Additionally, CMS will follow Federal, HHS, and CMS policies including all applicable publications, the HHS Information Systems Program Handbook, and the CMS Information Security Handbook.
The Contract may require access to Port Authority information considered Protected Information (“PI”) as defined in the Port Authority Information Security Handbook (“Handbook”), dated October, 2008, corrected as of November 14, 2013, and as may be further amended.
By its execution of this Agreement, the SWPM agrees to (a) comply with the Information Security Handbook, and (b) require all of its employees, consultants, and contractors and all Ancillary Service Contractors (and any other parties required by the Information Security Handbook) to comply with the Information Security Handbook and the terms of this Section.