Information Systems Security Sample Clauses

Information Systems Security. If the individual purchase order is for operationally critical support or for which performance will involve covered defense information, Supplier is required to provide adequate security on all covered contractor information systems. To provide such security, Supplier must implement information security protections, including compliance with the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.” See DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting (DEC 2019). Federal Acquisition Regulation (FAR) Clauses 52.202-1 DEFINITIONS. 52.203-6, RESTRICTIONS ON SUBCONTRACTOR SALES TO THE GOVERNMENT (SEP 2006) (Applicable to purchase orders that exceed the simplified acquisition threshold ($150,000)). 52.203-7, ANTI-KICKBACK PROCEDURES (MAY 2014) (Applicable to purchase orders that exceed $150,000).
AutoNDA by SimpleDocs
Information Systems Security. In the event this Agreement or an Order provides for remote access to Company’s electronic information systems (“CIS”) by Provider, Provider shall at all times protect CIS through procedures and tools deemed satisfactory to Company. Such procedures and tools shall include without limitation:
Information Systems Security. A comprehensive information technology security policy shall be developed on the basis of an approved strategy for information and communication technology to ensure confidentiality, integrity and availability of all data:
Information Systems Security. All the technical and non-technical means of protection, allowing an Information System to withstand events likely to compromise the availability, integrity and confidentiality of data processed or transmitted and the related services that these systems offer or make accessible. 3DS OUTSCALE Service(s) or Service(s): The IaaS services ordered by the CLIENT in the framework of the Agreement and subject to this Service Agreement in application thereof.
Information Systems Security. If Nortel grants Seller access to Nortel’s information systems, Seller will safeguard the security of Nortel’s information systems, as set out in Exhibit O, attached to and incorporated in this Agreement.
Information Systems Security. A major goal of our Information Security Program is to defend against security intrusion through a combination of layered prevention technologies and comprehensive security monitoring. Our security infrastructure has been designed according to industry standards for virus protection, firewalls and intrusion‐prevention technologies in order to prevent unauthorized access or compromises of CDW’s network, systems and servers. To maintain this level of security, CDW: • Periodically tests systems to identify/remediate information security issues • Conducts vulnerability scans • Usesindustry‐standardsecurityresourcestoobtain up‐to‐dateinformation onsecurity issues across many technologies • Monitors network connections with intrusion prevention/detection systems • Bans use of insecure protocols in infrastructure management ortransmitting sensitive information • Configures network and system devices so event logs are maintained in a centralized system • Requires CDW management approval for any direct connections to our information systems • Isolates guest wireless networks and unauthenticated connectivity from CDW internaltraffic
Information Systems Security. Employees working for the Lake Preston School District at alternative work sites should use District provided computers and other devices that have been approved by the Technology Department. It is not recommended for Remote workers to use their own mobile computing devices, computers, or computer software. Remote Working networks should all be password secured and systems that access Lake Preston networks remotely must have an anti-malware (anti-virus) package, an endpoint protection software package installed that protects the network from advanced threats, and multi-factor authentication steps that have been approved by the Technology Department.
AutoNDA by SimpleDocs
Information Systems Security. 1.8.1 Generally, includes the installation, configuration, administration, operation, maintenance, and monitoring of security and backup/recovery processes as well as network security systems
Information Systems Security. 12. I will only access DHS’s workstations, portable devices, and information systems (including email and internet) for business usage and I will use them only as allowed by DHS’s policies.
Information Systems Security. A. I understand the Information Systems and all information in these Systems:
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!