Information Security Management Practices Sample Clauses

Information Security Management Practices. You must have a reasonable security management practice in place. In particular, your information security management practice must have:
AutoNDA by SimpleDocs

Related to Information Security Management Practices

  • Best Management Practices 1. Contractor shall conduct operations under this Contract so as to assure that pollutants do not enter municipal storm drain systems which systems are comprised of, but are not limited to curbs and gutters that are part of the street systems ("Stormwater Drainage System"), and to ensure that pollutants do not directly impact "Receiving Waters" (as used herein, Receiving Waters include, but are not limited to, rivers, creeks, streams, estuaries, lakes, harbors, bays and oceans).

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Monitoring and Management Information C10.1 The Contractor shall comply with the monitoring arrangements set out in the Monitoring Schedule including, but not limited to, providing such data and information as the Contractor may be required to produce under the Contract.

  • Procurement and Property Management Standards The parties to this Agreement shall adhere to the procurement and property management standards established in 2 CFR 200, Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards, and to the Texas Uniform Grant Management Standards. The State must pre-approve the Local Government’s procurement procedures for purchases to be eligible for state or federal funds.

  • Information Management Information and Records

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Safeguards Monitoring and Reporting 8. The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • FINANCIAL MANAGEMENT AND OVERSIGHT Measure 2a Is the school meeting financial reporting and compliance requirements?

  • Best Practices The Recipient acknowledges they may or may not have access to the Owner’s Confidential Information and agrees that it shall not directly or indirectly divulge, disclose, or communicate any of the Confidential Information to any third party, except as may be required during any formal business association or dealings on behalf of the Owner for any event, with the prior written approval of the Owner. The Recipient acknowledges that no license of the Confidential Information, by implication or otherwise, is granted to the Recipient by reason of this Agreement. Additionally, the Recipient acknowledges that it may only use the Confidential Information in connection with its business dealings with the Owner and for no other purpose without the prior written consent of the Owner.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following:

Time is Money Join Law Insider Premium to draft better contracts faster.