Sensitive Assets definition
Examples of Sensitive Assets in a sentence
For Sensitive Assets (including Personal Information) resident on a Component the NEPP System that is connected to the Internet, , the Contractor shall maintain of up- to-date firewall protection and operating system security patches, to maintain the integrity and Security of Sensitive Assets.
In addition, Sensitive Assets stored on laptops or other portable devices shall be Encrypted.
Such practices shall include (i) educating and training employees (i) on the proper use of the Security systems and compliance with the Security Standards; and (ii) on the importance of Security for Sensitive Assets including, in particular, Personal Information; (ii) imposing disciplinary measures for violations of the Information Security Program and its rules; and (iii) preventing terminated employees from accessing Sensitive Assets (including Personal Information).
The Contractor shall implement and maintain, throughout the Term, safeguards and other protections to control and prevent Physical Access to Sensitive Assets (including Sensitive Assets that constitute Personal Information) ("Physical Security Measures").
These required Physical Security Measures shall include the Secure transportation of Sensitive Assets outside (i) from Contractor, Subcontractor, or Authority computing facilities or other premises; and (ii) from Third Party computing facilities or other premises, where such Third Party is under the control or direction of the Contractor..
The Contractor shall review its Information Security Program (including its Risk Assessment, Physical Security Measures and Technical Security Measures) (i) at least quarterly, or (ii) whenever there is a change in its business practices or the design, build, deployment, operation, or maintenance of the NEPP System that implicates the security or integrity of Sensitive Assets embodied in or related to the NEPP System.
The Contractor shall implement and follow Secure access control measures to (i) restrict access to records and files that contain or constitute Sensitive Assets to those who need such information to perform their job duties; and (ii) assign unique identifications plus passwords, which are not vendor supplied default passwords, to each person with access to the NEPP System, that are reasonably designed to maintain the integrity of the Security of the access controls.
The Contractor shall cause the Encryption of Sensitive Assets (including Personal Information) (a) that will be transmitted across public networks, (b) that will travel outside the premises of a Secure facility, or (c) that will be transmitted wirelessly.
The Contractor shall update its Information Security Program (including its Risk Assessment, Physical Security Measures and Technical Security Measures) regularly to ensure that the Information Security Program is operating in a manner calculated to prevent unauthorized access to or unauthorized use of Sensitive Assets.
The Duration Gap Analysis (DGA) would involve bucketing of all on- and off- balance sheet Risk Sensitive Assets (RSA) and Risk Sensitive Liabilities (RSL) as per their residual maturity / re-pricing dates in various time bands and computing the Modified Duration Gap (MDG).