Common use of AUTHORITIES Clause in Contracts

AUTHORITIES. The Contractor shall follow all current versions of Government policies and guidance accessible at xxxx://xxx.xxx.xxx/dhs-security-and-training-requirements-contractors, or available upon request from the Contracting Officer, including but not limited to: (1) DHS Management Directive 11042.1 Safeguarding Sensitive But Unclassified (for Official Use Only) Information (2) DHS Sensitive Systems Policy Directive 4300A (3) DHS 4300A Sensitive Systems Handbook and Attachments (4) DHS Security Authorization Process Guide (5) DHS Handbook for Safeguarding Sensitive Personally Identifiable Information (6) DHS Instruction Handbook 000-00-000 Department of Homeland Security Personnel Suitability and Security Program (7) DHS Information Security Performance Plan (current fiscal year) (8) DHS Privacy Incident Handling Guidance (9) Federal Information Processing Standard (FIPS) 140-2 Security Requirements for Cryptographic Modules accessible at xxxx://xxxx.xxxx.xxx/groups/STM/cmvp/standards.html (10) National Institute of Standards and Technology (NIST) Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations accessible at xxxx://xxxx.xxxx.xxx/publications/PubsSPs.html (11) NIST Special Publication 800-88 Guidelines for Media Sanitization accessible at xxxx://xxxx.xxxx.xxx/publications/PubsSPs.html

Appears in 7 contracts

Samples: Blanket Purchase Agreement (Bpa), Blanket Purchase Agreement, Blanket Purchase Agreement (Bpa)

AutoNDA by SimpleDocs

AUTHORITIES. The Contractor shall follow all current versions of Government policies and guidance accessible at xxxx://xxx.xxx.xxx/dhs-security-and-training-requirements-contractors, or available upon request from the Contracting Officer, including but not limited to: (1) DHS Management Directive 11042.1 Safeguarding Sensitive But Unclassified (for Official Use Only) Information (2) DHS Sensitive Systems Policy Directive 4300A (3) DHS 4300A Sensitive Systems Handbook and Attachments (4) DHS Security Authorization Process Guide (5) DHS Handbook for Safeguarding Sensitive Personally Identifiable Information (6) DHS Instruction Handbook 000-00-000 Department of Homeland Security Personnel Suitability and Security Program (7) DHS Information Security Performance Plan (current fiscal year) (8) DHS Privacy Incident Handling Guidance (9) Federal Information Processing Standard (FIPS) 140-2 Security Requirements for Cryptographic Modules accessible at xxxx://xxxx.xxxx.xxx/groups/STM/cmvp/standards.html (10) National Institute of Standards and Technology (NIST) Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations accessible at xxxx://xxxx.xxxx.xxx/publications/PubsSPs.htmlat (11) NIST Special Publication 800-88 Guidelines for Media Sanitization accessible at xxxx://xxxx.xxxx.xxx/publications/PubsSPs.html

Appears in 2 contracts

Samples: Indefinite Delivery Indefinite Quantity (Idiq) Contract, Indefinite Delivery Indefinite Quantity (Idiq) Contract

AutoNDA by SimpleDocs

AUTHORITIES. The Contractor shall follow all current versions of Government policies and guidance accessible at xxxx://xxx.xxx.xxx/dhs-security-and-training-requirements-contractorsh ttp://xxx.xxx.xxx/xxx-xxxxxxxx-xxx-xxxxxxxx-xxxxxxxxxxxx-xxxxxxxxxxx, or available upon request from the Contracting Officer, including but not limited to: (1) DHS Management Directive 11042.1 Safeguarding Sensitive But Unclassified (for Official Use Only) Information (2) DHS Sensitive Systems Policy Directive 4300A (3) DHS 4300A Sensitive Systems Handbook and Attachments (4) DHS Security Authorization Process Guide (5) DHS Handbook for Safeguarding Sensitive Personally Identifiable Information (6) DHS Instruction Handbook 000-00-000 Department of Homeland Security Personnel Suitability and Security Program (7) DHS Information Security Performance Plan (current fiscal year) (8) DHS Privacy Incident Handling Guidance (9) Federal Information Processing Standard (FIPS) 140-2 Security Requirements for Cryptographic Modules accessible at xxxx://xxxx.xxxx.xxx/groups/STM/cmvp/standards.html (10) National Institute of Standards and Technology (NIST) Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations accessible at xxxx://xxxx.xxxx.xxx/publications/PubsSPs.html (11) NIST Special Publication 800-88 Guidelines for Media Sanitization accessible at xxxx://xxxx.xxxx.xxx/publications/PubsSPs.html

Appears in 1 contract

Samples: Gsa Stars Ii Idiq Contract

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!