Cyber Essentials Scheme. 11.6 The Contractor will employ effective administration and record control processes in order to underpin service delivery whilst also ensuring data is protected in compliance with the requirements of the Data Protection Laws.
Cyber Essentials Scheme. 15.1 The Provider shall provide the Administering Authority with a valid Cyber Essentials Scheme Basic Certificate, as a condition for the award of a contract(s) under this DPS Agreement.
Cyber Essentials Scheme. Information Security Management System
Cyber Essentials Scheme. Where CCS has notified the Supplier that prior to the execution of the first Call Off Agreement the Supplier shall provide a valid Cyber Essentials Scheme Basic Certificate, then on or prior to the execution of the first Call Off Agreement, as a condition for the award of this Framework Agreement, the Supplier must have delivered to the Authority evidence of the same. Where the Supplier continues to process Cyber Essentials Scheme Data during the Framework Period or the contract period of any Call Off Agreement the Supplier shall deliver to the Authority evidence of renewal of a valid Cyber Essentials Scheme Basic Certificate on each anniversary of the first applicable certificate obtained by the Supplier under Clause 9.1. Where the Supplier is due to process Cyber Essentials Scheme Data after the commencement date of the first Call Off Agreement but before the end of the Framework Period or contact period of the last Call Off Agreement, the Supplier shall deliver to the Authority evidence of: a valid Cyber Essentials Scheme Basic Certificate (before the Supplier Processes any such Cyber Essentials Scheme Data); and renewal of a valid Cyber Essentials Scheme Basic Certificate on each anniversary of the first Cyber Essentials Scheme certificate obtained by the Supplier under Clause 9.3.1. In the event that the Supplier fails to comply with Clauses 9.2 or 9.3 (as applicable), the Authority reserves the right to terminate this Framework Agreement for material Default.
Cyber Essentials Scheme devices you use in processing the personal data transferred, and how you keep those updated):☐ We regularly backup our data Regular backups of your most important data will ensure it can be quickly restored in the event of disaster or ransomware infection.Supplementary details of how data is backed up (add any relevant details): DATA EXPORTER Authorised Signature … → ACTION: The exporter should fill in this section with the: • Full name of the person signing. This must be the same person throughout the document. And sign where indicated. → ACTION: The importer should fill in this section with the: • Full name of the person signing. This must be the same person throughout the document. And sign where indicated DATA IMPORTER Authorised Signature
Cyber Essentials Scheme. The Cyber Essentials Scheme developed by the Government which provides a clear statement of the basic controls all organisations should implement to mitigate the risk from common internet based threats. Details of the Cyber Essentials Scheme can be found here: xxxxx://xxx.xxx.xx/government/publications/cyber- essentials-scheme-overview. Cyber Essentials Scheme Basic Certificate The certificate awarded on the basis of self-assessment, verified by an independent certification body, under the Cyber Essentials Scheme and is the basic level of assurance. Cyber Essentials Scheme Data Sensitive and personal information and other relevant information as referred to in the Cyber Essentials Scheme. Cyber Essentials Scheme Plus Certificate The certification awarded on the basis of external testing by an independent certification body of the Supplier’s cyber security approach under the Cyber Essentials Scheme and is a more advanced level of assurance. Data Controller Has the same meaning as set out in the Data Protection Act 1998. Data Processor Has the same meaning as set out in the Data Protection Act 1998. Data Protection Legislation or DPA The Data Protection Act 1998 and all applicable laws and regulations relating to processing of personal data and privacy, including any related guidance and codes of practice issued by the Information Commissioner or relevant Government departments. Data Subject Has the same meaning as set out in the Data Protection Act 1998. Data Subject Access Request A request made by a Data Subject in accordance with rights granted pursuant to the DPA to access his or her Personal Data Default Any breach of the Framework Agreement by the Supplier, for which the Supplier is liable to CCS. This includes, but is not limited to, breach of a fundamental term, omission, misrepresentation, negligence or negligent statement in in relation to this Framework Agreement or the subject matter of this Framework Agreement. DOTAS The Disclosure of Tax Avoidance Schemes rules which require a promoter of tax schemes to tell HMRC of any specified notifiable arrangements or proposals and to provide prescribed information on those arrangements or proposals within set time limits as contained in Part 7 of the Finance Act 2004 and in secondary legislation made under powers contained in Part 7 of the Finance Act 2004 and as extended to national insurance contributions by the National Insurance Contributions (Application of Part 7 of the Finance Act 2004) Regulation...
Cyber Essentials Scheme. 4.1 The Contractor shall, and shall procure that any Sub-contractor (as applicable) shall, obtain and maintain certification to Cyber Essentials (the “Cyber Essentials Certificate”) in relation to the Services during the Term. The Cyber Essentials Certificate shall be provided by the Contractor to the Authority annually on the dates as agreed by the Parties.
Cyber Essentials Scheme. (c) Security Policy Framework
Cyber Essentials Scheme. 24.4.1 The Supplier shall ensure that all Sub-Contracts with Sub-Contractors who Process Cyber Essentials Data contain provisions no less onerous on the Sub- Contractors than those imposed on the Supplier under this Contract in respect of the Cyber Essentials Scheme under Clause 5.
Cyber Essentials Scheme. 3.7.4.1 It is mandatory for Suppliers by the date of the commencement of the Framework Agreement or at a later date when Cyber Essentials Data are received by the Supplier to demonstrate that they meet the technical requirements prescribed by Cyber Essentials. This is in order to further reduce the levels of cyber security risks in their supply chains. The Cyber Essentials Scheme and the related Assurance Framework both indicate that there are two levels of protection in dealing with cyber security risks. These include a more basic level of assurance which is known as Cyber Essentials and a more advanced level of assurance known as "Cyber Essentials Plus". With regard to the Services, Suppliers must demonstrate that they have achieved the level of assurance known as Cyber Essentials. Suppliers shall demonstrate this in one of the ways listed below: