Cloud Security Principles Sample Clauses

Cloud Security Principles. 8.2.1 Critical Where any service is provided using public, hybrid or private cloud instances, or where cloud technologies are used to provide or support elements of the Service, the Service Provider must meet the requirements detailed in the HMG Cloud Security Principles. Security reporting and alerting thresholds must be agreed with the Authority and documented. The Service Provider will be required to document all Logging and Monitoring capabilities within component applications and infrastructure, even if these are not proposed to be implemented in the service delivered for the Authority. The Service Provider shall demonstrate clearly, for any public, hybrid or private cloud data hosting services utilised in the provision of the Services, how solutions comply with and which of the designated levels of assurance they will provide for each of the Principles within the relevant NCSC Cloud Security Guidance referenced below: i. Cloud Standards and Definitions ii. Implementing Cloud Security Principles iii. Having confidence in cyber security. Response
AutoNDA by SimpleDocs

Related to Cloud Security Principles

  • Key Principles 1.1. The Parties are committed to joint working in relation to the functions covered by this Agreement.

  • Basic Principles The Electrical Contractor and the Union have a common and sympathetic interest in the Electrical Industry. Therefore, a working system and harmonious relations are necessary to improve the relationship between the Employer, the Union and the Public. Progress in industry demands a mutuality of confidence between the Employer and the Union. All will benefit by continuous peace and by adjusting any differences by rational common-sense methods.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Cost Principles The Subrecipient shall administer its program in conformance with 2 CFR Part 200, et al; (and if Subrecipient is a governmental or quasi-governmental agency, the applicable sections of 24 CFR 85, “Uniform Administrative Requirements for Grants and Cooperative Agreements to State and Local Governments,”) as applicable. These principles shall be applied for all costs incurred whether charged on a direct or indirect basis.

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

  • General and Security Exceptions 1. Subject to the requirement that such measures are not applied by a Contracting Party in a manner which would constitute a means of arbitrary or unjustifiable discrimination against, or a disguised restriction on investors of the other Contracting Party and their investments in the Territory of the former Contracting Party, nothing in this Agreement shall be construed so as to prevent the former Contracting Party from adopting or enforcing measures:

  • Principles of cooperation The Parties shall apply the following principles to cooperation activities covered by this Agreement:

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • DEFENSE FEDERAL ACQUISITION REGULATION SUPPLEMENT CONTRACT CLAUSES 252.246-7000 MATERIAL INSPECTION AND RECEIVING REPORT (MAR 2008)

  • AIR FORCE FEDERAL ACQUISITION REGULATION SUPPLEMENT CONTRACT CLAUSES 5352.201-9101 OMBUDSMAN (APR 2014) Para (c). Ombudsmen names, addresses, phone numbers, fax, and email addresses. 'Xx. Xxxx Xxxxxxxxxx, AFLCMC/AQP, Phone: DSN 000-0000 Comm (000) 000-0000, E- mail: Xxxx.xxxxxxxxxxxxxxx.0@xx.xx.xxx.' 5352.223-9000 ELIMINATION OF USE OF CLASS I OZONE DEPLETING SUBSTANCES (ODS) (NOV 2012) 5352.223-9001 HEALTH AND SAFETY ON GOVERNMENT INSTALLATIONS (NOV 2012) 5352.242-9000 CONTRACTOR ACCESS TO AIR FORCE INSTALLATIONS (NOV 2012) Para (b), Any additional requirements to comply with local security procedures '"to be cited in each individual task order"' Para (d). Additional requirements. '"any additional requirements to comply with AFI 31- 101, Volume 1, the Air Force Installation Security Program, and AFI 31-501, Personnel Security Program Management"' 5352.242-9001 COMMON ACCESS CARDS (CAC) FOR CONTRACTOR PERSONNEL-AF SYSTEMS (NOV 2012)

Time is Money Join Law Insider Premium to draft better contracts faster.