Security Framework Sample Clauses

Security Framework. In addition to your obligations set forth in the Security Schedule, you expressly agree to establish, implement and update, as necessary, security policies, procedures, and systems related to the initiation, processing and storage of ACH Origination entries.
AutoNDA by SimpleDocs
Security Framework. Security framework uses an ACL architecture similar to Windows NT. An access control entry allows or denies a player or a group access to game capabilities in service resolution. The set of actions for player in a game include sending and receiving messages and accessing service data such as the collection of current players. The security token is a 32bit value in which every bit represents an allowed action. A security token is associated with a player-game or a group-game pair to form an Access Control Entry (ACE). The collection of all ACEs for a game forms the service's Access Control List (ACL).
Security Framework. Encryption will be a minimum 128bit file and image encryption. Secure Socket Layer (SSL) and user loginlpassword will be employed. User passwords are controlled by the Submitter and should be monitoredlor changed periodically to ensure security. Computers on which documents originate must have all critical operating system patches applied, must have a firewall (hardware or software) installed, and must have up to date virus scan software.
Security Framework. The required security framework is provided for in the SECURE G2G Portal software. The SECURE G2G Portal software shall use a minimum of 128-bit file and image encryption. Industry standard Secure Sockets Layer (SSL) and user login with password that is encrypted shall be employed. User passwords are controlled by the Government Agency and at a minimum changed at 90-day intervals to reduce security exposure.
Security Framework. The OHAA system will be hosted on the Amazon Virtual Private Cloud (VPC) through Amazon Web Services (AWS). This solution will provide the logically isolated sections for the various provider offices participating. This architecture will ensure physician’s offices have autonomous control over their data and also supports the data sharing capability with minimal impact to the underlying infrastructure. This significantly reduces both capital and operational expense outlays. Amazon Web Services also maintains compliance to HIPAA privacy and security standards through Federal Risk and Authorization Management Program (FedRAMP) and National Institute of Standards and Technology (NIST) 800-53, a higher security standard that maps to the HIPAA security rule. AWS enables covered entities and their business associates subject to HIPAA to securely process, store, and transmit PHI. The elements that will be part of the security framework are: Login To gain access to the OHAA system, the user is identified/ authorized through a multi- factor authentication framework; using a combination of their unique Network Id/password and a secure token. Admin safeguards like filling an access form and getting it approved by the security officer is in place. Access to the OHAA System The OHAA system uses the HTTPS protocol to protect the information sent over the network and the Internet. The user connects using a url that is HTTPS secure to access the OHAA system via the internet. With IPSEC-V4/TLS being used the connection between the various points of communication between the systems in the network path is encrypted. VPN adds an additional layer of encryption by protecting all the information being exchanged. Access Controls File system access controls, implemented via security policies and/or a permissions table, will be in place to ensure that individuals within each state accessing the resources like the file system, documents, images etc. on the servers can be authorized before gaining access. A log is maintained of all the activity of each user that accesses the network/servers. File access controls in place will ensure who gains access to network resources. Internal Networks The firewalls will provide a layer of security starting from the point of entry and throughout the different layers of the system. Based on providing a "Defense in Depth” strategy, the external network and the network perimeter will be monitored using auditing. Penetration testing, vulnerability ana...
Security Framework. The Kentucky Online Gateway (KOG) provides user provisioning and authorization services. Every component of QHI including MEMS shall invoke KOG services prior to executing a user request from within the MEMS solution. The new MEMS solution shall utilize the KOG solution for user provisioning and authorization services.
Security Framework. In addition to your obligations set forth in the Security Schedule, you expressly agree to establish, implement and update, as necessary, security policies, procedures, and systems related to the initiation, processing and storage of ACH Origination entries. Provisional Credit. You acknowledge that the NACHA Operating Rules make provisional any credit given for an entry until the financial institution crediting the account specified in the entry receives final settlement. If the financial institution does not receive final settlement, it is entitled to a refund from the credited party and the originator of the entry shall not be deemed to have paid the party.
Security Framework. The required security framework is provided for in the SECURE ERDS software. The ERDS software shall use a minimum of 128 bit file and image encryption. Industry standard Secure Sockets Layer (SSL) and user login with password that is encrypted shall be employed. User passwords are controlled by the user and at a minimum changed at 90 day intervals to reduce security exposure.

Related to Security Framework

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Financial Ability Each of the Buyer Parties acknowledges that its obligation to consummate the transactions contemplated by this Agreement and the Brewery Transaction is not and will not be subject to the receipt by any Buyer Party of any financing or the consummation of any other transaction other than the occurrence of the GM Transaction Closing and, in the case of the Brewery Transaction, the consummation of the transactions contemplated by this Agreement. The Buyer Parties have delivered to ABI a true, complete and correct copy of the executed definitive Second Amended and Restated Interim Loan Agreement, dated as of February 13, 2013, among Bank of America, N.A. (“Bank of America”), JPMorgan Chase Bank N.A. (“JPMorgan”) and CBI (collectively, the “Financing Commitment”), pursuant to which, upon the terms and subject to the conditions set forth therein, the lenders party thereto have committed to lend the amounts set forth therein (the “Financing”) for the purpose of funding the transactions contemplated by this Agreement and the Brewery Transaction. The Buyer Parties have delivered to ABI true, complete and correct copies of the fee letter and engagement letters relating to the Financing Commitment (redacted only as to the matters indicated therein), the Financing Commitment has not been amended or modified prior to the date of this Agreement, and, as of the date hereof, the respective commitments contained in the Financing Commitment have not been withdrawn, terminated or rescinded in any respect. There are no agreements, side letters or arrangements to which CBI or any of its Affiliates is a party relating to the Financing Commitment that could affect the availability of the Financing. The Financing Commitment constitutes the legally valid and binding obligation of CBI and, to the Knowledge of CBI, the other parties thereto, enforceable in accordance with its terms (except as such enforceability may be limited by bankruptcy, insolvency, fraudulent conveyance, reorganization, moratorium and other similar Laws of general applicability relating to or affecting creditors’ rights, and by general equitable principles). The Financing Commitment is in full force and effect and has not been withdrawn, rescinded or terminated or otherwise amended or modified in any respect, and no such amendment or modification is contemplated. Neither CBI nor any of its Affiliates is in breach of any of the terms or conditions set forth in the Financing Commitment, and assuming the accuracy of the representations and warranties set forth in Article 4 and performance by ABI of its obligations under this Agreement and the Brewery SPA, as of the date hereof, no event has occurred which, with or without notice, lapse of time or both, would reasonably be expected to constitute a breach, default or failure to satisfy any condition precedent set forth therein. As of the date hereof, no lender has notified CBI of its intention to terminate the Financing Commitment or not to provide the Financing. There are no conditions precedent or other contingencies related to the funding of the full amount of the Financing, other than as expressly set forth in the Financing Commitment. The aggregate proceeds available to be disbursed pursuant to the Financing Commitment, together with available cash on hand and availability under CBI’s existing credit facility, will be sufficient for the Buyer Parties to pay the Purchase Price hereunder and under the Brewery SPA and all related fees and expenses on the terms contemplated hereby and thereby in accordance with the terms of this Agreement and the Brewery SPA. As of the date hereof, CBI has paid in full any and all commitment or other fees required by the Financing Commitment that are due as of the date hereof. As of the date hereof, the Buyer Parties have no reason to believe that CBI and any of its applicable Affiliates will be unable to satisfy on a timely basis any conditions to the funding of the full amount of the Financing, or that the Financing will not be available to CBI on the Closing Date.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

Time is Money Join Law Insider Premium to draft better contracts faster.