Information and Security Program Sample Clauses

Information and Security Program. 4.25.1 Within ninety (90) days of the Effective Date, Network Operator will provide MassTech with a copy of the Network Operator’s Written Information Security Program (“WISP”), as required by Massachusetts Regulation 201 C.M.R. 17.00. The WISP shall be signed by the Network Operator’s designated Chief Information Security Officer (“CISO”). The CISO shall have cybersecurity training from a third-party cybersecurity organization. The WISP shall be subject to MassTech’s review and approval. The Network Operator shall have an ongoing, continuing obligation to maintain and comply with the WISP.
AutoNDA by SimpleDocs

Related to Information and Security Program

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Information and Services 2.1.1 The Owner shall provide full information in a timely manner regarding the requirements of the Project, including the Owner’s objectives, constraints and criteria, space requirements and relationships, flexibility and expandability requirements, special equipment and systems, and site requirements as reasonably requested by Construction Manager in writing.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Background and Security Investigations 8.1 For the safety and welfare of the children to be served under this Contract, CONTRACTOR shall, as permitted by law, ensure that its staff, employees, independent contractors, volunteers or subcontractors who may come in contact with children in the course of their work, undergo and pass a background investigation to the satisfaction of COUNTY as a condition of beginning and continuing to work under this contract. Such background investigation may include, but shall not be limited to criminal conviction information obtained through fingerprints submitted to the California Department of Justice. The fees associated with the background investigation shall be at the expense of the CONTRACTOR, regardless if the member of CONTRACTOR’s staff passes or fails the backgrounds investigation.

  • Identification and Disclosure of Privacy and Security Offices Business Associate and Subcontractors shall provide, within ten (10) days of the execution of this agreement, written notice to the Covered Entity’s contract/grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer. This information must be updated any time either of these contacts changes.

  • Information and Data 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!