Information Security Infosec Sample Clauses

Information Security Infosec. The Contractor shall implement InfoSec measures for its contractor furnished unclassified information technology system(s) used in performance of this contract. InfoSec measures shall be compliant with DFARS 252.204-7012, Safeguarding of Unclassified Controlled Technical Information. At a minimum, the security standards extracted from the referenced National Institute of Standards and Technology (NIST) Special Publication 800-53, Security and Privacy Controls for Federal Information Systems and Organizations, or accepted equivalents, shall be incorporated into any InfoSec program the contractor establishes.
AutoNDA by SimpleDocs
Information Security Infosec 

Related to Information Security Infosec

  • Facility Information The Product is: Renewable Energy Facility or Unit Specific; if so, complete the following: Name of Facility Location of Facility EIA number Online Date Renewable Energy Source specific; if so, state: Aggregator area specific. Use the following table for generator aggregation programs: REC Delivery Unit Specific Generating Renewable Energy Unit / Renewable Energy Source Generating Renewable Energy Aggregation Program / Renewable Energy Sources Location of Generator or Area of Aggregation Delivery 3

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Safety Information Any other bulletins may only be posted by mutual agreement between the Union and designated Management.

  • Company Information Subscriber understands that the Company is subject to all the risks that apply to early-stage companies, whether or not those risks are explicitly set out in the Offering Circular. Subscriber has had such opportunity as it deems necessary (which opportunity may have presented through online chat or commentary functions) to discuss the Company’s business, management and financial affairs with managers, officers and management of the Company and has had the opportunity to review the Company’s operations and facilities. Subscriber has also had the opportunity to ask questions of and receive answers from the Company and its management regarding the terms and conditions of this investment. Subscriber acknowledges that except as set forth herein, no representations or warranties have been made to Subscriber, or to Subscriber’s advisors or representative, by the Company or others with respect to the business or prospects of the Company or its financial condition.

  • Third Party Information I understand, in addition, that the Company has received and in the future will receive from third parties confidential or proprietary information (“Third Party Information”) subject to a duty on the Company’s part to maintain the confidentiality of such information and to use it only for certain limited purposes. During the term of my employment and thereafter, I will hold Third Party Information in the strictest confidence and will not disclose to anyone (other than Company personnel who need to know such information in connection with their work for the Company) or use, except in connection with my work for the Company, Third Party Information unless expressly authorized by an officer of the Company in writing.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • PRIVACY INFORMATION Through Your Use of the Website and Services, You may provide Us with certain information. By using the Website or the Services, You authorize the Company to use Your information in the United States and any other country where We may operate.

  • Property Information The Agent shall provide to the Vendor the Property Information Form including the Vendor’s Statement prescribed under the Estate Agents Practice (General Duties and Hong Kong Residential Properties) Regulation duly completed and signed by the Agent.

Time is Money Join Law Insider Premium to draft better contracts faster.