Information Technology Security. A. The Financial Agent shall develop, maintain, enforce, and at least annually review for effectiveness, information technology security measures designed to ensure the (i) availability,
Information Technology Security. To the extent the Contractor uses information technology resources of the state of Iowa, the following terms and conditions shall apply:
27.1 Contractor and all Contractor personnel shall comply with Iowa information technology security statutes, rules and policies.
27.2 By signing this contract, the Contractor acknowledges that the Contractor has read and understands the provisions of the information technology security policies adopted by the Iowa Office of the Chief Information Officer (OCIO) and DNR in effect on the date of signing.
27.3 The Contractor further agrees to read and abide by any revised OCIO and DNR policies, posted on the respective agency websites, that come into effect during the term of this Contract.
Information Technology Security. The Contractor shall provide information in both paper and electronic formats to Government Agencies and support services Contractors, including and especially the SNS, per USG direction. The Contractor shall provide the IT security plan to safeguard computers, databases, and other IT materials associated with the contract. This plan shall demonstrate confidentiality and integrity of and timely access by authorized individuals to data, information and information technology systems. The Contractor shall agree to comply with the IT system security and/or privacy specifications set forth in the Statement of Work, the Computer Security Act of 1987 Office of Management and Budget (OMB) Circular A-130, Appendix III, “Security of Federal Automated Information Systems,” and the DHHS Automated Information Systems Security Program Handbook (Release 2.0, dated May 1994). The Contractor further agrees to include this provision in any subcontract awarded pursuant to this prime contract. NOTE: OMB A-130 <hxxx://xxxxxxx.xxx.xxx/xxxxxx/aissp.html> is accessible via web site.
Information Technology Security. Services. Beginning on the Closing Date, Parent Group shall provide the following services in accordance with the IT Separation Standards:
(a) firewall monitoring, administration, configuration and reporting.
(b) VPN and remote-access monitoring, administration, configuration management and support.
(c) E-mail virus protection, spam filtering and attack monitoring, prevention and reporting.
(d) Real-time monitoring and updating of virus definitions on all hosts and clients (including laptops).
Information Technology Security a. As a condition of access to this Center of Excellence, DHS agrees not to provide the Recipient any data or information that is sensitive or i.e., information or data that would not be released completely in response to a request under the Freedom of Information Act, 5 U.S.C. § 552. Should the Recipient receive any data or information from DHS that the Recipient has reason to believe may be sensitive or classified, within 24 hours, the Recipient shall (1) notify the DHS Grants Management Specialist named in the award documents; (2) shall send such data or information to the Grants Management Specialist, unless otherwise directed by DHS; (3) shall erase or otherwise destroy any vestige of such data or information in its records and computer systems; and (4) shall notify the Grants Management Specialist of the means and time of such destruction.
Information Technology Security. The University acknowledges that, in connection with the services being provided hereunder, the Contractor may need to operate certain information technology systems, including, but not limited to, point-of-sale devices, e-commerce solutions, and computer hardware and software services and applications (collectively the “Non-University Systems”). The University further acknowledges that the Non-University Systems may need to interface with or connect to the University’s networks and information technology systems (collectively the “University Systems”). The University shall be solely responsible for all University Systems, and the Contractor shall be responsible for all non-University Systems, including taking reasonable security and privacy precautions including, but not limited to, network firewall protections, anti-virus software and the ability to maintain regular patching levels of mission-critical software. If the Contractor serves as the merchant-of-record for any credit or debit card transactions in connection with any of the services provided hereunder, the Contractor shall comply with all applicable laws, regulations and payment card industry data security standards related to the protection of cardholder data (collectively the “Data Protection Rules”). At the request of the Contractor, the University shall implement such changes to the University Systems as are necessary to enable the Contractor to comply with the Data Protection Rules.
Information Technology Security. In connection with the services being provided hereunder, The Hitching Post may need to operate certain information technology systems not owned by the Client (Non-Client Systems), which may need to interface with or connect to Client’s networks, internet access, or information tech- nology systems (Client Systems). The Hitching Post shall be responsible for all Non-Client Systems, and Client shall be solely responsible for Client Systems, including taking the necessary security and privacy protections as are reasonable under the circumstances. If the Hitching Post serves as the merchant-of-record for any credit or debit card transactions in connection with any of the services provided hereunder, then the Hitching Post will be re- sponsible for complying with all applicable laws, regulations and payment card industry data security standards related to the protection of cardholder data (Data Protection Rules). If Non-Client Systems interface with or con- nect to Client Systems, then Client agrees to implement forthwith upon request from the Hitching Post, at its own expense, the changes to the Client Systems that the Hitching Post reasonably requests and believes are necessary or prudent to ensure the Hitching Post’s compliance with the Data Protection Rules. Each party shall indemnify, defend and hold harmless the other party from all claims, liabilities, damages and costs (including reasonable attorneys' fees) to the extent caused by the indemnifying party’s failure to comply with its obligations in this Section. Effective Date: Client: City of Xxxxxxxx By: (Authorized Officer or Principal Signature) Printed Name: Xxxxxx X. Xxxxxx Title: Mayor By: (Authorized Officer or Principal Signature) Printed Name: Xxxx Box Title: City Clerk Signature Date: Principal Address: 000 X. Xxxx Xxxxxx, Xxxxxxxx, XX 00000 Premises Location(s): Amateur Sports Complex, 000 Xxxxx Xxxxx, Xxxxxxxx, XX 00000 Client Notice To: Name: Xxxxx XxxXxxXxxxxx Title: Director, Community Services The Hitching Post of Marshall, Inc. d/b/a Hitching Post Eatery and Saloon By: (Authorized Officer or Principal Signature) Printed Name: Xxxxxx Xxxxxxxxx Title: Signature Date: The Hitching Post Notice To: Name: Hitching Post of Marshall, Inc.
Information Technology Security. Prior to the Closing, the Company will promptly notify Parent of any material security incident relating to its information technology systems, including, any incidents involving loss or potential loss of Intellectual Property or personally identifiable information. The Company shall cooperate and work with Parent to (i) mitigate any identified network, operating system, and application security vulnerabilities, (ii) apply and validate security patches, (iii) deploy and validate security tools, and (iv) migrate non-supported versions of operating systems to supported versions with patches.
Information Technology Security. Each of the Group company has taken reasonable steps and implemented reasonable procedures designed to protect its information technology systems from (i) the inclusion of any device or feature designed to permit unauthorized access, disrupt, disable or otherwise harm, damage or impair Software, hardware or data, and (ii) unauthorized access, use, modification or other misuse. To Selling Parties’ Knowledge, there have been no material security breaches in the information technology systems of the Group Company. There have been no disruptions in any of the information technology systems of the Group Company that have materially adversely affected the Business or operations of the Group Company.
Information Technology Security. In connection with the services being provided hereunder, Trinity may need to operate certain information technology systems not owned by the Client (“Non-Client Systems”), which may need to interface with or connect to Client’s networks, internet access, or information technology systems (“Client Systems”). Trinity shall be responsible for all Non-Client Systems, and Client shall be solely responsible for Client Systems, including taking the necessary security and privacy protections as are reasonable under the circumstances. If Trinity serves as the merchant-of-record for any credit or debit card transactions in connection with any of the services provided hereunder, then Trinity will be responsible for complying with all applicable laws, regulations and payment card industry data security standards related to the protection of cardholder data (“Data Protection Rules”). If Non-Client Systems interface with or connect to Client Systems, then Client agrees to implement forthwith upon request from Trinity, at its own expense, the changes to the Client Systems that Trinity reasonably requests and believes are necessary or prudent to ensure Trinity's compliance with the Data Protection Rules. Each party shall indemnify, defend, and hold harmless the other party from all claims, liabilities, damages, and costs (including reasonable attorneys' fees) to the extent caused by the indemnifying party’s failure to comply with its obligations in this Section.