Information Assurance/Cybersecurity Sample Clauses

Information Assurance/Cybersecurity. The Contractor shall provide ITSM ticket assessments to assist the GCSS-MC/LCM Increment 1 Cybersecurity team with user accounts and system access issues and adjudicate at the lowest level or reassign tickets to the GCSS-MC Cybersecurity team. The Contractor shall support Role Based Access Control (RBAC) implementation by maintaining components, including OIM, OID, and EBS. The Contractor shall support system use of Electronic Data Interchange Personal Identifier (EDIPI) and provide Oracle Web certificate wallet management. The Contractor shall conduct user account auditing. The Contractor shall conduct audit log reviews and provide anomalies to the Program ISSM. The Contractor shall provide the Program ISSM with augmented GOC support to maintain the Authentication Stack base software and RICECPW.
AutoNDA by SimpleDocs
Information Assurance/Cybersecurity. C.3.8.1. All work under this contract shall comply with the latest version of all applicable standards. These may include, but are not limited to, Army policies to include Army Regulation 25-2, Information Assurance (IA), associated Best Business Practices, Department of Defense (DoD) policy to include DoD Instruction (XxXX) 8500.01, Cybersecurity, and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS) publications. C.3.8.2. The contractor shall update the Risk Management Framework (RMF) Assess & Authorize documentation to ensure that the artifacts are kept current and contain all information, and supporting evidence is documented, complete, and available for the next certification and accreditation. This shall include reviewing changes made to the system in order to identify any new data types that may have a privacy impact or change the security categorization of the system. C.3.8.3. The contractor shall provide all required information to the AMSAA Information System Security Manager (ISSM) to obtain/renew any required Certificate of Networthiness (CoN). This includes, but is not limited to data flow diagrams and Security Technical Implementation Guide (STIG) checklists. C.3.8.4. Any representative of the contractor requiring administrative privileges to a Government database, web server or development environments will need cybersecurity certification in accordance with Army and/or DoD regulations. Section E - Inspection and Acceptance INSPECTION AND ACCEPTANCE TERMS Supplies/services will be inspected/accepted at: XXXX INSPECT AT INSPECT BY ACCEPT AT ACCEPT BY 0001 Destination Government Destination Government 0002 Destination Government Destination Government 0003 Destination Government Destination Government CLAUSES INCORPORATED BY REFERENCE 52.246-2 Inspection Of Supplies--Fixed Price AUG 1996 52.246-3 Inspection Of Supplies Cost-Reimbursement MAY 2001 52.246-4 Inspection Of Services--Fixed Price AUG 1996 52.246-5 Inspection Of Services Cost-Reimbursement APR 1984 Section F - Deliveries or Performance DELIVERY INFORMATION CLIN DELIVERY DATE QUANTITY SHIP TO ADDRESS DODAAC 0001 N/A N/A N/A N/A 0002 N/A N/A N/A N/A 0003 N/A N/A N/A N/A CLAUSES INCORPORATED BY REFERENCE 52.242-15 Stop-Work Order AUG 1989 52.242-15 Alt I Stop-Work Order (Aug 1989) - Alternate I APR 1984

Related to Information Assurance/Cybersecurity

  • INFORMATION ASSURANCE (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. SELLER shall comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. SELLER shall not use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and shall not disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information. (b) If SELLER becomes aware of any compromise of information used in the performance of this Contract or provided by LOCKHEED XXXXXX to SELLER, its officers, employees, agents, suppliers, or subcontractors (an “Incident”), SELLER shall take appropriate immediate actions to investigate and contain the Incident and any associated risks, including notification within seventy-two (72) hours to LOCKHEED XXXXXX after learning of the Incident. As used in this clause, “compromise” means that information has been exposed to unauthorized access, inadvertent disclosure, known misuse, loss, destruction, or alteration other than as required to perform the Work. SELLER shall provide reasonable cooperation to LOCKHEED XXXXXX in conducting any investigation regarding the nature and scope of any Incident. Any costs incurred in investigating or remedying Incidents shall be borne by SELLER. (c) Any LOCKHEED XXXXXX provided information identified as proprietary or subject to restrictions on public disclosure by law or regulation shall be encrypted (i) if transmitted via the Internet, or (ii) during electronic storage if potentially accessible by the Internet or otherwise by non-authorized users. (d) The provisions set forth above are in addition to and do not alter, change or supersede any obligations contained in a proprietary information agreement between the parties.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Information Services The Custodian may rely upon information received from issuers of Securities or agents of such issuers, information received from Subcustodians or depositories, information from data reporting services that provide detail on corporate actions and other securities information, and other commercially reasonable industry sources; and, provided the Custodian has acted in accordance with the standard of care set forth in Section 6 (a), the Custodian shall have no liability as a result of relying upon such information sources, including but not limited to errors in any such information.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment. 5.2 If a D&E Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by D&E, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. D&E shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 D&E shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow D&E to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. 5.4 D&E shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from D&E Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, D&E shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow D&E to route information services traffic originated on its network to Verizon.

  • Shareholder Information Services (i) Make information available to shareholder servicing unit and other remote access units regarding trade date, share price, current holdings, yields, and dividend information. (ii) Produce detailed history of transactions through duplicate or special order statements upon request. (iii) Provide mailing labels for distribution of financial reports, prospectuses, proxy statements or marketing material to current shareholders. (iv) Respond as appropriate to all inquiries and communications from shareholders relating to shareholder accounts.

  • REGULATORY ADMINISTRATION SERVICES BNY Mellon shall provide the following regulatory administration services for each Fund and Series:  Assist the Fund in responding to SEC examination requests by providing requested documents in the possession of BNY Mellon that are on the SEC examination request list and by making employees responsible for providing services available to regulatory authorities having jurisdiction over the performance of such services as may be required or reasonably requested by such regulatory authorities;  Assist with and/or coordinate such other filings, notices and regulatory matters and other due diligence requests or requests for proposal on such terms and conditions as BNY Mellon and the applicable Fund on behalf of itself and its Series may mutually agree upon in writing from time to time; and

  • Information Management Information and Records

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Information Reporting We may report your performance under this Agreement to credit reporting agencies, including your failure to make minimum payments on time. A negative credit report may significantly harm your ability to obtain credit from other sources. We may also obtain follow-up credit reports on you (for example, when we review your Account for a credit line increase). We may exchange information about you or your Account with our affiliates, and, to the extent permitted by law, with other third parties. However, if you prefer that we not share such information with our affiliate companies, just call us at (000) 000-0000 or outside the Albuquerque area, 0-000-000-0000. You may also write to us at Nusenda Federal Credit Union, P.O. Box 8530, Albuquerque, New Mexico 87198. Closing Your Account. You may close your Account at any time by notifying us in writing. However, you remain responsible to pay the balance according to the terms of this Agreement. We may close your Account or suspend your Account privileges at any time without prior notice. We may also reissue a different Card, Account number, or different checks at any time. You must return the Card or the checks to us upon request. Lost or Stolen Cards. If any Card, Account Number or PIN is lost or stolen, or if you think someone used or may use them without your permission, notify us at once by calling the telephone number shown on the billing statement or by calling 0-000-000-0000. We may require you to provide certain information in writing to help us find out what happened. Do not use the Card after we've been notified, even if it is found or returned. You will not be liable for any unauthorized purchases or cash advances made after we've been notified of the loss or the theft; however, you must identify for us the charges on the billing statement that were not made by you or someone authorized by you, and from which you received no benefit. Credit Authorizations. We are not responsible if we do not approve a purchase or cash advance on your Account, or if a third party refuses to accept or honor the Card, even if you have sufficient credit available. We may limit the number of purchases or cash advances which may be approved in one day. If we detect unusual or suspicious activity on your Account, we may temporarily suspend your credit privileges until we can verify the activity. We may approve purchases or cash advances that cause the balance to exceed your credit line without waiving any of our rights under the Agreement. Waiver. Our failure to exercise, or our delay in exercising any of our rights under this Agreement for any reason does not mean that we will be unable to exercise these rights later.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!