Information Systems Security. If the individual purchase order is for operationally critical support or for which performance will involve covered defense information, Supplier is required to provide adequate security on all covered contractor information systems. To provide such security, Supplier must implement information security protections, including compliance with the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.” See DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting (OCT 2016). Federal Acquisition Regulation (FAR) Clauses GOVERNMENT (SEP 2006) (Applicable to purchase orders that exceed the simplified acquisition threshold ($150,000)).
Information Systems Security. All the technical and non-technical means of protection, allowing an Information System to withstand events likely to compromise the availability, integrity and confidentiality of data processed or transmitted and the related services that these systems offer or make accessible. 3DS OUTSCALE Service(s) or Service(s): The IaaS services ordered by the CLIENT in the framework of the Agreement and subject to this Service Agreement in application thereof.
Information Systems Security. In the event this Agreement or an Order provides for remote access to Company’s electronic information systems (“CIS”) by Provider, Provider shall at all times protect CIS through procedures and tools deemed satisfactory to Company. Such procedures and tools shall include without limitation:
(i) A mechanism to determine and immediately report to Company possible security breaches;
(ii) Controls to ensure the return or destruction, at Company’s direction, of information transmitted through CIS;
(iii) A process for maintaining the confidentiality, integrity and availability of information transmitted through CIS; and
(iv) Methods for controlling access to CIS, which shall include without limitation (i) permitted access methods; (ii) an authorization process for users’ access and privileges; and (iii) maintenance of a list of authorized users.
Information Systems Security. A comprehensive information technology security policy shall be developed on the basis of an approved strategy for information and communication technology to ensure confidentiality, integrity and availability of all data:
(a) Information systems security shall be based on the criteria laid down in the version applicable in the financial year concerned of International Standards Organisation 17799/British Standard 7799: Code of practise for Information Security Management (BS ISO/IEC 17799) and any guidelines on the application of these standards established by the Commission.
(b) Security measures shall be adapted to the administrative structure, staffing and technological environments of each individual structure, authority or body of the management and control systems. The financial and technological effort shall be in proportion to the actual risks incurred.
Information Systems Security. If Nortel grants Seller access to Nortel’s information systems, Seller will safeguard the security of Nortel’s information systems, as set out in Exhibit O, attached to and incorporated in this Agreement.
Information Systems Security. A major goal of our Information Security Program is to defend against security intrusion through a combination of layered prevention technologies and comprehensive security monitoring. Our security infrastructure has been designed according to industry standards for virus protection, firewalls and intrusion‐prevention technologies in order to prevent unauthorized access or compromises of CDW’s network, systems and servers. To maintain this level of security, CDW: • Isolates guest wireless networks and unauthenticated connectivity from CDW internaltraffic
Information Systems Security. Employees working for the Lake Preston School District at alternative work sites should use District provided computers and other devices that have been approved by the Technology Department. It is not recommended for Remote workers to use their own mobile computing devices, computers, or computer software. Remote Working networks should all be password secured and systems that access Lake Preston networks remotely must have an anti-malware (anti-virus) package, an endpoint protection software package installed that protects the network from advanced threats, and multi-factor authentication steps that have been approved by the Technology Department.
Information Systems Security. 1.8.1 Generally, includes the installation, configuration, administration, operation, maintenance, and monitoring of security and backup/recovery processes as well as network security systems
1.8.2 Backup/recovery support with procedural development and testing
1.8.3 Consulting services through the identification and analysis of emerging technologies to improve or enhance the County's security posture to protect its data network, systems, workstations, and servers from internal and external attacks
1.8.4 Network monitoring services including:
1.8.4.1 Surveillance of network traffic, performance, and security to ensure the integrity and security of the County’s networks and all its related components (human element, physical and virtual servers, domain controllers, desktops, laptops, printers, and other devices which utilize the County network)
Information Systems Security. The contractor shall address information systems security aspects associated with contract performance including: (a) physical and system protections against unauthorized access to IT resources, (b) control of unclassified and unclassified but sensitive information (FOUO); (c) system password deletions within one working day of personnel changes and system-required periodic password changes; and (d) annual completion of DoD Information Awareness (IA) training before access to any Government IT hardware. The Government’s intent is to eventually move the current information systems to a dot-mil compliant platform. It is anticipated that there will be additional training and certifications required in preparation for this change.
Information Systems Security. The Board and the Recorder will jointly provide information systems security services. The Parties will cooperate and coordinate with respect to these security services, consistent with all State and Federal laws and regulations governing election security, including, but not limited to, threat monitoring, video recording, and cyber-attack prevention. Both the Recorder and the Board will work with the Maricopa County Sheriff’s Office and other law enforcement agencies as warranted under this section.