Cybersecurity Standard Update 2023-01 Sample Clauses

Cybersecurity Standard Update 2023-01. Contractor confirms that all products and services provided to or for the use of the State under this Agreement shall be in compliance with State of Vermont Cybersecurity Standard Update 2023-01, which prohibits the use of certain branded products in State information systems or any vendor system that is supporting State information systems, and is available on-line at: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives.
AutoNDA by SimpleDocs
Cybersecurity Standard Update 2023-01. Contractor confirms that all products and services provided to or for the use of the State under this Agreement shall be in compliance with State of Vermont Cybersecurity Standard Update 2023-01, which prohibits the use of certain branded products in State information systems or any vendor system that is supporting State information systems, and is available on-line at: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives. 7/31/2023 Xxxxxx De Xx Xxxxxx Date Commissioner, DVHA NOB 1 SOUTH, 000 XXXXX XXXXX WATERBURY, VT 00000-0000 PHONE: 000-000-0000 Email: Xxxxxx.XxXxXxxxxx@xxxxxxx.xxx Xxxxxxx X. Xxxx, President Date 0000 X. Xxxxxxxxx Blvd. FORT XXXXX, IN 46804 PHONE: 000-000-0000 Email: Xxxxx@Xxxxxxxx.xxx 1. DEFINITIONS: a. Deliverables Expectations Document (DED) means an official document representing what will be included in a deliverable before it is developed and submitted to the State by Contractor. Unless otherwise noted, Contractor shall seek approval of a DED for each deliverable before work begins. b. Deliverables Acceptance Document (DAD) is an official document validating a deliverable has been reviewed and accepted or rejected by a State representative.
Cybersecurity Standard Update 2023-01. All products and services provided to or for the use of the State under this Agreement shall be in compliance with State of Vermont Cybersecurity Standard Update 2023-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives . This document consists of 2 pages. Except as modified by this Amendment No. 01, all provisions of the Contract remain in full force and effect. The signatures of the undersigned indicate that each has read and agrees to be bound by this Amendment to the Contract. By: By: Name: Name: Title: Title: Date: Date: Contractor: Motorola Solutions, Inc.

Related to Cybersecurity Standard Update 2023-01

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Nxxxx X Xxxxxxx is hereby designated as the Chief Executive Officer and Chief Financial Officer and Jxxx Xxxxxxxxx is designated the General Counsel and Secretary of the Company, each to serve in such capacity until his earlier death, resignation or removal from office.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • xxx/Xxxxxx/XXXXX- 19_School_Manual_FINAL pdf -page 101-102 We will continue to use the guidelines reflected in the COVID-19 school manual.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!