Systems Security Requirements Sample Clauses

Systems Security Requirements. 5.1 Overview
AutoNDA by SimpleDocs
Systems Security Requirements. 5.1 Overview  SSA must certify that the EIEP has implemented controls that meet the requirements and work as intended, before we will authorize initiating transactions to and from SSA through batch data exchange processes or online processes such as State Online Query (SOLQ) or Internet SOLQ (SOLQ-I). The Technical Systems Security Requirements (TSSRs) address management, operational, and technical aspects of security safeguards to ensure only the authorized disclosure and use of SSA-provided information by SSA’s EIEPs. SSA recommends that the EIEP develop and publish a comprehensive Systems Security Policy document that specifically addresses:  the classification of information processed and stored within the network,  administrative controls to protect the information stored and processed within the network,  access to the various systems and subsystems within the network,  Security Awareness Training,  Employee Sanctions Policy,  Incident Response Policy, and  the disposal of protected information and sensitive documents derived from the system or subsystems on the network. SSA’s systems security requirements represent the current state-of-the-practice security controls, safeguards, and countermeasures required for Federal information systems by Federal regulations, statutes, standards, and guidelines. Additionally, SSA’s systems security requirements also include organizationally defined interpretations, policies, and procedures mandated by the authority of the Commissioner of Social Security in areas when or where other cited authorities may be silent or non-specific.
Systems Security Requirements. 1. MVA must safeguard information provided under this Agreement by complying with the Systems Security Requirements (SSR) described in the
Systems Security Requirements. 4.8.1.1. The Contractor shall assist the Government in establishing and maintaining a comprehensive security program for all acquisition and sustainment programs throughout the system life cycle.
Systems Security Requirements. 1. AAMVA will safeguard the data provided under this Agreement by complying with all administrative, technical, and physical security requirements of SSA’s Systems Security Requirements (SSR) as set forth in
Systems Security Requirements. If Information is delivered to the Recipient in softcopy form or is stored electronically in the Recipient's Information processing system(s), the Recipient will also implement the following requirements for such Information:
Systems Security Requirements 
AutoNDA by SimpleDocs

Related to Systems Security Requirements

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Policy Requirements All of the policies of insurance referred to in this Article XIII shall be written in form reasonably satisfactory to Landlord and any Facility Mortgagee and issued by insurance companies with a minimum policyholder rating of “A-” and a financial rating of “VII” in the most recent version of Best’s Key Rating Guide, or a minimum rating of “BBB” from Standard & Poor’s or equivalent. If Tenant obtains and maintains the general liability insurance described in Section 13.1(e) above on a “claims made” basis, Tenant shall provide continuous liability coverage for claims arising during the Term. In the event such “claims made” basis policy is canceled or not renewed for any reason whatsoever (or converted to an “occurrence” basis policy), Tenant shall either obtain (a) “tail” insurance coverage converting the policies to “occurrence” basis policies providing coverage for a period of at least three (3) years beyond the expiration of the Term, or (b) an extended reporting period of at least three (3) years beyond the expiration of the Term. Tenant shall pay all of the premiums therefor, and deliver certificates thereof to Landlord prior to their effective date (and with respect to any renewal policy, prior to the expiration of the existing policy), and in the event of the failure of Tenant either to effect such insurance in the names herein called for or to pay the premiums therefor, or to deliver such certificates thereof to Landlord, at the times required, Landlord shall be entitled, but shall have no obligation, to effect such insurance and pay the premiums therefor, in which event the cost thereof, together with interest thereon at the Overdue Rate, shall be repayable to Landlord upon demand therefor. Tenant shall obtain, to the extent available on commercially reasonable terms, the agreement of each insurer, by endorsement on the policy or policies issued by it, or by independent instrument furnished to Landlord, that it will give to Landlord thirty (30) days’ (or ten (10) days’ in the case of non-payment of premium) written notice before the policy or policies in question shall be altered, allowed to expire or cancelled. Notwithstanding any provision of this Article XIII to the contrary, Landlord acknowledges and agrees that the coverage required to be maintained by Tenant may be provided under one or more policies with various deductibles or self-insurance retentions by Tenant or its Affiliates, subject to Landlord’s approval not to be unreasonably withheld. Upon written request by Xxxxxxxx, Tenant shall provide Landlord copies of the property insurance policies when issued by the insurers providing such coverage.

  • Authority Requirements During the Compliance Period, the following provisions shall apply.

  • Personal Property Requirements The Collateral Agent shall have received:

  • Quality Requirements Performance Indicator Heading Indicator (specific) Threshold Method of Measurement Frequency of monitoring Consequence of Breach QUALITY Patient Safety - Incidents I1 Number of incidents Adverse incidents include the following: clinical or non clinical adverse events that have potential to cause avoidable harm to a patient, including medical errors or adverse events related to medical devices or other equipment. Clinical or non- clinical accidents, accidental injuries to staff and members of the public, verbal, physical or psychological abuse or harassment, unusual or dangerous occurrences, damage to trust property, plant or equipment, fire or flood, security, theft or loss, near misses are identified as any event where under different circumstances significant injury or loss may have occurred Number of recorded incidents in the contract month Monthly Remedial Action Plan brought to Performance Meeting following breach; action under Module C Clause 32 if needed I2 Number of Sis Definition of SUI according to trust policy and national guidance Number of Serious Untoward Incidents reported in contract month Monthly Remedial Action Plan brought to Performance Meeting following breach; action under Module C Clause 32 if needed S1 Percentage of eligible staff received child safeguarding training at level 2 (as identified in LSCB training strategy) 95% Number received training/ Number of identified staff requiring training Monthly S2 Percentage of eligible staff received adult safeguarding awareness training at level 2 ( as identified in K&M Safeguarding Vulnerable Adults training strategy) 95% Number of staff trained/ Number of identified staff requiring training Monthly

  • Business Day Requirements In the event that any notice or other action or omission is required to be taken by a Party under this Agreement on a day that is not a Business Day then such notice or other action or omission shall be deemed to be required to be taken on the next occurring Business Day.

  • Eligibility Requirements The Trustee hereunder shall at all times (i) be a corporation or association having its principal office in a state and city acceptable to the Seller, organized and doing business under the laws of such state or the United States of America, authorized under such laws to exercise corporate trust powers, having a combined capital and surplus of at least $50,000,000, or shall be a member of a bank holding system, the aggregate combined capital and surplus of which is at least $50,000,000, provided that its separate capital and surplus shall at all times be at least the amount specified in Section 310(a)(2) of the Trust Indenture Act of 1939, (ii) be subject to supervision or examination by federal or state authority and (iii) have a credit rating or be otherwise acceptable to the Rating Agencies such that neither of the Rating Agencies would reduce their respective then current ratings of the Certificates (or have provided such security from time to time as is sufficient to avoid such reduction) as evidenced in writing by each Rating Agency. If such corporation or association publishes reports of condition at least annually, pursuant to law or to the requirements of the aforesaid supervising or examining authority, then for the purposes of this Section the combined capital and surplus of such corporation or association shall be deemed to be its combined capital and surplus as set forth in its most recent report of condition so published. In case at any time the Trustee shall cease to be eligible in accordance with the provisions of this Section, the Trustee shall resign immediately in the manner and with the effect specified in Section 8.08.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Capital and Liquidity Requirements If any Lender or any Issuing Bank determines that any Change in Law regarding capital or liquidity requirements has or would have the effect of reducing the rate of return on such Lender’s or such Issuing Bank’s capital or on the capital of such Lender’s or such Issuing Bank’s holding company, if any, as a consequence of this Agreement or the Loans made by, or participations in Swingline Loans and Letters of Credit held by, such Lender, or the Letters of Credit issued by such Issuing Bank, to a level below that which such Lender or such Issuing Bank or such Lender’s or such Issuing Bank’s holding company could have achieved but for such Change in Law (taking into consideration such Lender’s or such Issuing Bank’s policies and the policies of such Lender’s or such Issuing Bank’s holding company with respect to capital adequacy and liquidity requirements), by an amount deemed to be material by such Lender or such Issuing Bank, then from time to time the Borrower will pay to such Lender or such Issuing Bank, as the case may be, in Dollars, such additional amount or amounts as will compensate such Lender or such Issuing Bank or such Lender’s or such Issuing Bank’s holding company for any such reduction suffered.

Time is Money Join Law Insider Premium to draft better contracts faster.