Information System Security. The Contractor shall protect and maintain all confidential information gained by reason of this contract against unauthorized use, access, disclosure, modification or loss. Personal and/or medical information collected, used or acquired in connection with this contract shall be used solely for the purposes of this contract.
Information System Security. Both Parties shall protect and maintain all confidential information gained by reason of this MOU against unauthorized use, access, disclosure, modification or loss. Personal and/or medical information collected, used or acquired in connection with this MOU shall be used solely for the purposes of this MOU.
Information System Security. LEDC shall protect and maintain all confidential information gained by reason of this contract against unauthorized use, access, disclosure, modification or loss. Personal and/or medical information collected, used or acquired in connection with this contract shall be used solely for the purposes of this contract.
Information System Security. The Undersigned and the Bank shall ensure the security of the information system used respectively in order to prevent any illegal intrusion, access, modification, destruction of business records or personal data of the Undersigned. The Bank shall bear the burden of proof for the non-existence of any disputes over any third party’s cracking into the protective measures of the Bank's information system or taking advantage of the leaks in such information system. The Bank shall bear the liability for any damage to the Undersigned caused by a third party intruding into the Bank’s information system.
Information System Security. Bank SinoPac and the Client shall ensure the security of the information systems they use to prevent unauthorized access to, acquisition of, tampering with, or destruction of business records or the Client’s personal data. In the event that a third party breaches the protection measures of Bank SinoPac’s information system or exploits a vulnerability in Bank SinoPac’s information system, Bank SinoPac shall bear the burden of proof for the non-existence of such fact. Bank SinoPac shall be liable for any damage to the Client by a third party’s hacking into Bank SinoPac’s information system.
Information System Security. The Contractor shall act as a temporary point-of-contact in the absence of the Federal IAO/NTR Information Assurance Officer/Network Technical Representative (IAO/NTR). The Contractor shall, at a minimum, perform the following security administration tasks: • User support:
a. Recommend to the Federal IAO/NTR and, as needed, nominating qualified network users for approval by the NRL Security Networking Group.
b. Ensuring SSD IT users have access to the network, only after approval by the NRL Code 1220.
c. Training new SSD IT users on the proper operating and security procedures.
d. Ensuring departed users accounts are secured and closed according to NRL directives and policies.
e. Ensure appropriate vetting process, training and forms are completed according to the type of SSD IT account needed (i.e., contractor, Federal Employee, Collaborator, Foreign National, etc.) • SSD IT systems support:
a. Ensuring that approved configurations of connected systems are maintained and that configuration changes are approved by the NRL Security Networking Group before implementation.
b. Using Shavlik HFNetChk and windows group policies, ensuring that the Division desktop and portable IT systems and the SSD shared computer systems and infrastructure meet DoD and DoN security standards, and reporting completed IAVA/B’s to the SSD NTR or NRL Security Networking Group or both in accordance with technical direction.
c. Notifying the COR, the Federal IAO/NTR, and the NRL Security Networking Group of security violations or suspicious activities pertaining to the SSD computer systems, servers and the SSD shared computer systems and infrastructure.
Information System Security. DSE does not hold or maintain any classified information systems. Use of classified information at other cleared locations requires coordination with the local Information Systems Security Manager (ISSM). Contact the facility ISSM for review of System Security Plans (SSP) for all classified information systems. DSE does not maintain any SSPs.
Information System Security. Grantee shall protect and maintain all confidential information gained by reason of this Agreement against unauthorized use, access, disclosure, modification or loss. Personal and/or medical information collected, used or acquired in connection with this Agreement shall be used solely for the purposes of this contract.
Information System Security. HRC shall protect and maintain all confidential information gained by reason of this contract against unauthorized use, access, disclosure, modification or loss. Personal and/or medical information collected, used or acquired in connection with this contract shall be used solely for the purposes of this contract.
Information System Security. I understand that Trinity Health’s information systems are company property and are to be used only in accordance with the Trinity Health Information Systems Policy. I also understand that I may be given access codes or passwords to Trinity Health information systems, and that that I may use my access security codes or passwords only to perform my duties.