Computer System Security Requirements. To the extent that Supplier electronically stores or transmits Protected Information or has access to any UC Information Resources, it will include in its written, comprehensive Information Security Plan the establishment and maintenance of a security system covering its computers, including any wireless system, that, at a minimum, and to the extent technically feasible, will have the following elements:
Appears in 3 contracts
Samples: Purchasing Agreement, Purchasing Agreement, www.omniapartners.com
Computer System Security Requirements. To the extent that Supplier electronically stores or transmits Protected Information or has access to any UC Information Resources, it will include in its it’s written, comprehensive Information Security Plan the establishment and maintenance of a security system covering its computers, including any wireless system, system that, at a minimum, and to the extent technically feasible, will have the following elements:
Appears in 3 contracts
Samples: 64.166.146.245, public.omniapartners.com, public.omniapartners.com
Computer System Security Requirements. To the extent that Supplier electronically stores or transmits Protected Information or has access to any UC CoFL Information Resources, it will include in its written, comprehensive Information Security Plan the establishment and maintenance of a security system covering its computers, including any wireless system, that, at a minimum, and to the extent technically feasible, will have the following elements:: A. Secure user authentication protocols including: i. Control of user IDs and other identifiers;
Appears in 1 contract
Samples: Agreement