Data and Security System Framework Sample Clauses

Data and Security System Framework. If storing confidential Agency information, the Contractor shall comply with either of the following: • Provide certification of compliance with a minimum of one (1) of the following security frameworks, if the Contractor is storing Confidential Information electronically: NIST SP 800-53, HITRUST version 9, SOC 2, COBIT 5, CSA STAR Level 2 or greater, ISO 27001 or PCI-DSS version 3.2 prior to implementation of the system and again when the certification(s) expire, or • Provide attestation of a passed information security risk assessment, passed network penetration scans, and passed web application scans (when applicable) prior to implementation of the system and again annually thereafter. For the purposes of this section, “passed” means no unresolved high or critical findings.
AutoNDA by SimpleDocs
Data and Security System Framework. The Contractor shall comply with either of the following:
Data and Security System Framework. The Contractor shall comply with either of the following: • Provide certification of compliance with a minimum of one of the following security frameworks, if the Contractor is storing Confidential Information electronically: NIST SP 800-53, HITRUST version 9, COBIT 5, CSA STAR Level 2 or greater, or ISO 27001 prior to implementation of the system and again when the certification(s) expire, or • Provide attestation of a passed information security risk assessment, passed network penetration scans, and passed web application scans (when applicable) prior to implementation of the system and again annually thereafter. For purposes of this section, “passed” means no unresolved high or critical findings.

Related to Data and Security System Framework

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA.

  • Background Screening and Security 14 These General Contract Conditions supersede and replace in their entirety all General Contract Conditions, Form PUR 1000, which is incorporated by reference in Rule 60A-1.002, Florida Administrative Code (F.A.C.)

  • Support and Services ISD and HC agree to the following conditions:

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.