Information and Information Systems to Security Categories Sample Clauses

Information and Information Systems to Security Categories. (2 Volumes) - Volume 1: Guide Volume 2: Appendices.” Security controls and subsequent assessments are done based on the final categorization. Cloud providers must be approved for at least moderate level information through the GSA FedRAMP process prior to acquiring any services. Census Bureau identifies, assesses and authorizes use based on the published FedRAMP results and an assessment of any Census Bureau (customer provided) controls implemented to protect the infrastructure and data. Security reporting on cloud providers is reported to the Department of Commerce on a regular basis under FISMA. The Census Bureau maintains a policy regarding the reporting of and response to losses of protected data in accordance with OMB Memorandum M-17-12. Known or suspected losses of protected data must be reported within one hour of its discovery to the Bureau of the Census Computer Incident Response Team (BOC CIRT) who will report as required to the United States Computer Emergency Readiness Team (US CERT). " Once the Census Bureau becomes aware of a known breach of [agency name] data, the Census Bureau will contact the identified [agency name] contacts to discuss the actions and potential remedies in regards to the incident. " [The following language must be included in all agreements and MOUs that promise to deliver a statistical product, based on Title 13 data, outside of the Census Bureau.] B: Disclosure Avoidance Review of Statistical Products: DRB Language
AutoNDA by SimpleDocs
Information and Information Systems to Security Categories. (2 Volumes) - Volume 1: Guide Volume 2: Appendices.” Security controls and subsequent assessments are done based on the final categorization. The Census Bureau maintains a policy regarding the reporting of and response to losses of protected data in accordance with OMB Memorandum 6-19 and M-07-16. Known or suspected losses of protected data are reported within one hour to the United States Computer Emergency Readiness Team (US CERT). Once the Census Bureau becomes aware of a known breach of [agency name] data, the Census Bureau will contact the identified [agency name] contacts to discuss the actions and potential remedies in regards to the incident. Census can only agree to confidentiality/disclosure provisions to the “extent permitted by law.”].

Related to Information and Information Systems to Security Categories

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Data and Information 12.1 The parties shall comply with all relevant UK and EU data protection legislation in delivering their obligations under the Agreement.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Services and Information for Persons with Limited English Proficiency A. Grantee shall take reasonable steps to provide services and information both orally and in writing, in appropriate languages other than English, to ensure that persons with limited English proficiency are effectively informed and can have meaningful access to programs, benefits and activities. Meaningful access may entail providing language assistance services, including oral interpretation and written translation, if necessary. More information can be found at xxxxx://xxx.xxx.xxx/.

  • Correspondence and Information 6.1 Except where otherwise specified in this Agreement, correspondence between the Association and the University arising out of this Agreement or incidental thereto shall pass between the President and the President of the Association, or their designates.

  • Information and Services 2.1.1 The Owner shall provide full information in a timely manner regarding the requirements of the Project, including the Owner’s objectives, constraints and criteria, space requirements and relationships, flexibility and expandability requirements, special equipment and systems, and site requirements as reasonably requested by Construction Manager in writing.

  • Access and Information The Company, on the one hand, and Parent and Acquisition Corp., on the other hand, shall each afford to the other and to the other’s accountants, counsel and other representatives full access during normal business hours throughout the period prior to the Effective Time to all of its properties, books, contracts, commitments and records (including but not limited to tax returns) and during such period, each shall furnish promptly to the other all information concerning its business, properties and personnel as such other party may reasonably request, provided that no investigation pursuant to this Section 6.01 shall affect any representations or warranties made herein. Each party shall hold, and shall cause its employees and agents to hold, in confidence all such information (other than such information that (a) is already in such party’s possession or (b) becomes generally available to the public other than as a result of a disclosure by such party or its directors, officers, managers, employees, agents or advisors or (c) becomes available to such party on a non-confidential basis from a source other than a party hereto or its advisors, provided that such source is not known by such party to be bound by a confidentiality agreement with or other obligation of secrecy to a party hereto or another party until such time as such information is otherwise publicly available; provided, however, that (i) any such information may be disclosed to such party’s directors, officers, employees and representatives of such party’s advisors who need to know such information for the purpose of evaluating the transactions contemplated hereby (it being understood that such directors, officers, employees and representatives shall be informed by such party of the confidential nature of such information), (ii) any disclosure of such information may be made as to which the party hereto furnishing such information has consented in writing and (iii) any such information may be disclosed pursuant to a judicial, administrative or governmental order or request; provided, further, that the requested party will promptly so notify the other party so that the other party may seek a protective order or appropriate remedy and/or waive compliance with this Agreement and if such protective order or other remedy is not obtained or the other party waives compliance with this provision, the requested party will furnish only that portion of such information that is legally required and will exercise its best efforts to obtain a protective order or other reliable assurance that confidential treatment will be accorded the information furnished. If this Agreement is terminated, each party will deliver to the other all documents and other materials (including copies) obtained by such party or on its behalf from the other party as a result of this Agreement or in connection herewith, whether so obtained before or after the execution hereof.

  • Cost of Data and Information Exchange Each Party shall bear its own cost of providing information to the other Party.

Time is Money Join Law Insider Premium to draft better contracts faster.