Information Security Management definition
Examples of Information Security Management in a sentence
After Buyer approval the Security Management Plan and Information Security Management System will apply during the Term of this Call-Off Contract.
If requested to do so by the Buyer, before entering into this Call-Off Contract the Supplier will, within 15 Working Days of the date of this Call-Off Contract, develop (and obtain the Buyer’s written approval of) a Security Management Plan and an Information Security Management System.
Any compromise of CJIS Regulations is considered a violation of the Federal Information Security Management Act of 2002 and must be reported to the Department of Justice.
DOJ and ED agree to comply with the requirements of the Federal Information Security Management Act of 2002, as amended by the Federal Information Security Modernization Act of 2014 (FISMA), Pub.
Records, reports, documents, and information regarding tenants collected by the PHA pursuant to or in furtherance of HUD regulations shall be protected under the Privacy Act of 1974, 5 U.S.C. § 552(a), and the Federal Information Security Management Act (FISMA), 44 U.S.C § 3541.
The Services are not tailored to comply with industry-specific regulations (Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Management Act (FISMA), etc.), so if your interactions would be subjected to such laws, you may not use the Services.
The following functionality shall automatically be available to the GSA Customer with the Software: (i) if the GSA Customer purchases software subscription services, and subject to Government Information Security Requirements, including but not limited to those imposed by the Federal Information Security Management Act (FISMA), Licensor will regularly download and install software fixes and improvements to the installed DatAdvantage® environment.
Safeguarding of Individual Data HUD and DOJ will comply with the existing and future requirements set forth by the Privacy Act of 1974 (5 U.S.C. § 552a), as amended, the Federal Information Security Management Act (FISMA), 44 U.S.C. §§ 3541-3549, related OMB circulars and memoranda such as Circular A-130, Managing Information as a Strategic Resource (July 28, 2016), and Memorandum M-17-12, Preparing for and Responding to a Breach of Personally Identifiable Information (Jan.
The Contractor shall provide the Information Security Management System to the Authority upon request within 10 Working Days from such request.
Consultant shall have and maintain security controls to protect the Company’s networks, systems, software, Confidential Information, and Data that are no less rigorous than the latest published version of ISO/IEC 27001 – Information Security Management Systems–Requirements, and ISO/IEC 27002 – Code of Practice for International Security Management.