Functional Area 4 - Security Sample Clauses

Functional Area 4 - Security. The NRC Computer Security Staff is charged with a variety of functions related to the task of protecting NRC data, transmission links, and infrastructure. This functions are based primarily on the requirements contained in Public Law 100-235, "Computer Security Act of 1987" to develop security plans, The Office of Management and Budget (OMB) published guidance for the executive branch in OMB Circular A-1 30, "Management of Federal Information Resources", Appendix Ill, "Security of Federal Automated Information Resources" updated in 1996, and NRC's Management Directive 12.5. In addition,
AutoNDA by SimpleDocs
Functional Area 4 - Security. The NRC Computer Security Staff is charged with a variety of functions related to the task of protecting NRC data, transmission links, and infrastructure. This functions are based primarily on the requirements contained in Public Law 100-235, "Computer Security Act of 1987" to develop security plans, The Office of Management and Budget (OMB) published guidance for the executive branch in OMB Circular A-130, "Management of Federal Information Resources", Appendix Ill, "Security of Federal Automated Information Resources" updated in 1996, and NRC's Management Directive 12.5. In addition, Presidential Decision Directive (PDD) 63 specifies department/agency responsibilities to ensure they eliminate any significant vulnerability to cyber attacks on critical cyber systems.

Related to Functional Area 4 - Security

  • PREVAILING WAGE RATES - PUBLIC WORKS AND BUILDING SERVICES CONTRACTS If any portion of work being Bid is subject to the prevailing wage rate provisions of the Labor Law, the following shall apply:

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.

  • Offshoring 9.1 The Department’s Data must not be processed outside the United Kingdom without the prior written consent of DWP and must at all times comply with the Data Protection Xxx 0000.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Project or Building Name and Signage Landlord shall have the right at any time to change the name of the Project or Building and to install, affix and maintain any and all signs on the exterior and on the interior of the Project or Building as Landlord may, in Landlord’s sole discretion, desire. Tenant shall not use the name of the Project or Building or use pictures or illustrations of the Project or Building in advertising or other publicity or for any purpose other than as the address of the business to be conducted by Tenant in the Premises, without the prior written consent of Landlord.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

  • Building Security Landlord may restrict access to and from the Premises and the Building outside of the ordinary business hours of the Building. Landlord may require identification of persons entering and leaving the Building during this period and, for this purpose, may issue Building passes to tenants of the Building.

  • Unbundled Sub-Loop Feeder 2.8.4.1 Unbundled Sub-Loop Feeder (USLF) provides connectivity between BellSouth's central office and cross-box (or other access point) that serves an end user location. 2.8.4.2 USLF utilized for voice traffic can be configured as 2-wire voice (USLF-2W/V) or 4-wire voice (USLF-4W/V). 2.8.4.3 USLF utilized for digital traffic can be configured as 2-wire ISDN (USLF-2W/I); 2-wire Copper (USLF-2W/C); 4-wire Copper (USLF-4W/C); 4-wire DS0 level loop (USLF-4W/D0); or 4-wire DS1 and ISDN (USLF-4W/DI). 2.8.4.4 USLF will provide access to both the equipment and the features in the BellSouth central office and BellSouth cross box necessary to provide a 2W or 4W communications pathway from the BellSouth central office to the BellSouth cross- box. This element will allow for the connection of Lightyear’s loop distribution elements onto BellSouth's feeder system.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • CONTRACT SECURITY 8.2.1 The Contractor shall, prior to the Commencement Date or within the specified time, provide to the Owner any contract security specified in row D.2 of the Information Sheet.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!