BASIC SAFEGUARDING OF CONTRACTOR INFORMATION SYSTEMS Sample Clauses

BASIC SAFEGUARDING OF CONTRACTOR INFORMATION SYSTEMS. The Consultant shall apply basic safeguarding requirements and procedures to protect the Consultant’s information systems whenever the information systems store, process, or transmit any information, not intended for public release, which is provided by or generated for the City. This requirement does not include information provided by the City to the public or simple transactional information, such as that is necessary to process payments. These requirements and procedures shall include, at a minimum, the security control requirements “reflective of actions a prudent business person would employ” which are outlined in the Federal Acquisition Regulations FAR 52.204-21(b) and codified in the Code of Federal Regulations at 48 C.F.R. § 52.204-21(b) (2016). Consultant shall include the substance of this clause in subcontracts under this contract (including subcontracts for the acquisition of commercial items other than commercially available off-the-shelf items) in which the subcontractor may have City contract information residing in or transiting through its information system.
AutoNDA by SimpleDocs
BASIC SAFEGUARDING OF CONTRACTOR INFORMATION SYSTEMS. The Contractor shall apply basic safeguarding requirements and procedures to protect the Contractor’s information systems whenever the information systems store, process or transmit any information, not intended for public release, which is provided by or generated for the City. This requirement does not include information provided by the City to the public or simple transactional information, such as that necessary to process payments. These requirements and procedures shall include, at a minimum, the security control requirements “reflective of actions a prudent business person would employ” which are outlined in the Federal Acquisition Regulations FAR 52.204-21(b) and codified in the Code of Federal Regulations at 48 C.F.R. § 52.204-21(b) (2016). Contactor shall include the substance of this clause in subcontracts under this contract (including subcontracts for the acquisition of commercial items other than commercially available off-the-shelf items) in which the subcontractor may have City contract information residing in or transiting through its information system.
BASIC SAFEGUARDING OF CONTRACTOR INFORMATION SYSTEMS. A. Developer shall apply basic safeguarding requirements and procedures to protect the Developer’s information systems whenever the information systems store, process or transmit any information, not intended for public release, which is provided by or generated for the City. This requirement does not include information provided by the City to the public or simple transactional information, such as that necessary to process payments. These requirements and procedures shall include, at a minimum, the security control requirements “reflective of actions a prudent business person would employ” which are outlined in the Federal Acquisition Regulations FAR 52.204-21(b) and codified in the Code of Federal Regulations at 48 C.F.R. § 52.204-21(b) (2016).

Related to BASIC SAFEGUARDING OF CONTRACTOR INFORMATION SYSTEMS

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Information Systems 5.1. The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Privacy and User Information You acknowledge that in connection with your use of Mobile Banking, the Credit Union and service providers, including NCR, and its affiliates, may receive names, domain names, addresses, passwords, telephone and device numbers, the content of messages, data files and other data and information provided by you or from other sources in connection with Mobile Banking or the Software (“User Information”). The Credit Union and service providers will maintain reasonable safeguards to protect the information from unauthorized disclosure or use, but reserve the right to use and disclose this information as reasonably necessary to deliver Mobile Banking and as otherwise permitted by law, including compliance with court orders or lawful instructions from a government agency, to protect the personal safety of subscribers or the public, to defend claims, and as otherwise authorized by you the Credit Union and service providers also reserve the right to monitor use of Mobile Banking and the Software for purposes of verifying compliance with the law, these terms and conditions and any applicable license, but disclaim any obligation to monitor, filter, or edit any content. Restrictions on Use. You agree not to use Mobile Banking or the Software in or for any illegal, fraudulent, unauthorized or improper manner or purpose and will only be used in compliance with all applicable laws, rules and regulations, including all applicable state, federal, and international Internet, data, telecommunications, telemarketing, “spam,” and import/export laws and regulations, including the U.S. Export Administration Regulations. Without limiting the foregoing, you agree that you will not use Mobile Banking or the Software to transmit or disseminate: (i) junk mail, spam, or unsolicited material to persons or entities that have not agreed to receive such material or to whom you do not otherwise have a legal right to send such material; (ii) material that infringes or violates any third party’s intellectual property rights, rights of publicity, privacy, or confidentiality, or the rights or legal obligations of any wireless service provider or any of its clients or subscribers; (iii) material or data, that is illegal, or material or data, as determined by the Credit Union that is harassing, coercive, defamatory, libelous, abusive, threatening, obscene, or otherwise objectionable, materials that are harmful to minors or excessive in quantity, or materials the transmission of which could diminish or harm the reputation of the Credit Union or any third-party Mobile Banking service provider; (iv) material or data that is alcoholic beverage related (e.g., beer, wine, or liquor), tobacco-related (e.g., cigarettes, cigars, pipes, chewing tobacco), guns or weapons-related (e.g., firearms, bullets), illegal drugs-related (e.g., marijuana, cocaine), pornographic-related (e.g., adult themes, sexual content), crime-related (e.g., organized crime, notorious characters), violence-related (e.g., violent games), death-related (e.g., funeral homes, mortuaries), hate-related (e.g. racist organizations), gambling-related (e.g., casinos, lotteries), specifically mentions any wireless carrier or copies or parodies the products or services of any wireless carrier; (v) viruses, Trojan horses, worms, time bombs, cancelbots, or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data, or personal information; (vi) any material or information that is false, misleading, or inaccurate; (vii) any material that would expose the Credit Union, any third-party Mobile Banking service provider, or any other third party to liability; or (viii) any signal or impulse that could cause electrical, magnetic, optical, or other technical harm to the equipment or facilities of NCR or any third party. You agree that you will not attempt to: (a) access any software or services for which your use has not been authorized; or (b) use or attempt to use a third party’s account; or (c) interfere in any manner with the provision of Mobile Banking or the Software, the security of Mobile Banking or the Software, or other members of Mobile Banking or the Software; or (d) otherwise abuse Mobile Banking or the Software. You agree to abide by the Google terms and conditions of use found at xxxx://xxxx.xxxxxx.xxx/help/terms_maps.html and the Google Legal Notices found at xxxx://xxx.xxxx.xxxxxx.xxx/help/legal notices_maps.html, or other URLs as may be updated by Google.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!