Security Operations Sample Clauses

Security Operations the IS function manages support of implemented security solutions, monitors and scans the environment and assets, and manages incident response.
AutoNDA by SimpleDocs
Security Operations. CONTRACTOR shall provide all Security Operations in accordance with ACA Standards, and the FDC’s security procedures only to such extent as it is not in direct conflict with ACA Standards. CONTRACTOR shall provide a Security Operations Plan to the On-Site Contract Monitor prior to the Service Commencement Date. The plan shall be reviewed annually and updated as needed. Documentation of this review shall be provided annually to the On-Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.
Security Operations manages support of implemented security solutions, monitors and scans the environment and assets, and manages incident response.
Security Operations. 38.1 The City and the UNION and its officers, agents and members recognize there are assignments within the Miami Police Department where security of information is an absolute necessity. Therefore, the Chief of Police at his sole discretion may reject an employee to such assignment within the Miami Police Department when the Chief has reason to believe that there is potential for the Security of the Department to be compromised.
Security Operations. Manager shall manage and implement security services at the ARTIC Site.
Security Operations. Xxxxx XxXxxxxxx Information System Security Officer (ISSO) District 2, Southern Territory Service OperationsEnterprise Security Operations 0000 Xxxxxxx Xxxxx Xxxx Columbia, SC 29209 Telephone: (000) 000-0000 Email: Xxxxx.XxXxxxxxx@xx.xxx
Security Operations i. Provide internet services and support which include Internet address management, web caching, content filtering, bandwidth management, Internet authentication, firewall service, and Virtual Private Network Management
AutoNDA by SimpleDocs
Security Operations. Monitor systems and device logs, network traffic, intrusion detection systems and the client computing security tools to detect any unusual usage patterns, third-party attacks or unauthorized access and promptly report to the LW/Spinco any security incidents involving IT system integrity, confidentiality issues or unauthorized data access. • CAG/Parent to monitor, investigate, and promptly report to LW/Spinco any end user reported security incidents involving IT system integrity, confidentiality issues or unauthorized data access • Provide physical security to the Company’s equipment at the CAG/Parent datacenters. Field equipment security is the responsibility of LW/Spinco. • CAG/Parent to provide Anti-virus protection on server and PC assets, and SPAM monitoring services for the LW/Spinco’s email • Provide e-discovery and legal hold services consistent with services provided for the six (6) month period prior to the Distribution Date. • Provide security access via existing employee roll-on forms and processes as well as execute employee terminations as requested through existing HR process and SLAs (e.g. Non-Employee contractor status) See IT header Until Feb 28, 2018 TSA – Annex B Transition Services Agreement Schedule of Services
Security Operations. Information Sharing Establish formal liaison with law enforcement and implement procedures for receiving and disseminating threat information. Training Conduct new employee security awareness training. Conduct and maintain records of annual security awareness training. Security Management Designate a knowledgeable security professional to manage security of the facility. Ensure subOfferor compliance with BARDA security requirements.
Security Operations. 4.1. The Supplier shall ensure that Unical Aviation proprietary information and operational system state can be recovered following a Disaster or media failure.
Time is Money Join Law Insider Premium to draft better contracts faster.