Information Technology Security Training and Oversight Sample Clauses

Information Technology Security Training and Oversight. All contractor employees using Department automated systems or processing Department sensitive data will be required to receive Security Awareness Training. This training will be provided by the appropriate component agency of DHS. Contractors who are involved with management, use, or operation of any IT systems that handle sensitive information within or under the supervision of the Department, shall receive periodic training at least annually in security awareness and accepted security practices and systems rules of behavior. Department contractors, with significant security responsibilities, shall receive specialized training specific to their security responsibilities annually. The level of training shall be commensurate with the individual’s duties and responsibilities and is intended to promote a consistent understanding of the principles and concepts of telecommunications and IT systems security. All personnel who access Department information systems will be continually evaluated while performing these duties. Supervisors should be aware of any unusual or inappropriate behavior by personnel accessing systems. Any unauthorized access, sharing of passwords, or other questionable security procedures should be reported to the local Security Office or Information System Security Officer (ISSO).
AutoNDA by SimpleDocs
Information Technology Security Training and Oversight. All contractor employees using automated systems or processing INS sensitive data will be required to receive Security Awareness Training as outlined in the Computer Security Act of 1987. This training will be provided by the INS C&TS Program Office. All personnel who access INS information systems will be continually evaluated while performing these duties. Supervisors should be aware of any unusual or inappropriate behavior by personnel accessing systems. Any unauthorized access, sharing of passwords, or other questionable security procedures should be reported to the local Security Office or CSSO.

Related to Information Technology Security Training and Oversight

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information/Cooperation Executive shall, upon reasonable notice, furnish such information and assistance to the Bank as may be reasonably required by the Bank, in connection with any litigation in which it or any of its subsidiaries or affiliates is, or may become, a party; provided, however, that Executive shall not be required to provide information or assistance with respect to any litigation between Executive and the Bank or any other subsidiaries or affiliates.

  • Information and Cooperation Each Party that has responsibility for filing and prosecuting any Patent Rights under this Section 7.4 (a “Filing Party”) shall (a) regularly provide the other Party (the “Non-Filing Party”) with copies of all patent applications filed hereunder and other material submissions and correspondence with the patent offices, in sufficient time to allow for review and comment by the Non-Filing Party; and (b) provide the Non-Filing Party and its patent counsel with an opportunity to consult with the Filing Party and its patent counsel regarding the filing and contents of any such application, amendment, submission or response. The advice and suggestions of the Non-Filing Party and its patent counsel shall be taken into consideration in good faith by such Filing Party and its patent counsel in connection with such filing. Each Filing Party shall pursue in good faith all reasonable claims and take such other reasonable actions, as may be requested by the Non-Filing Party in the prosecution of any Patent Rights covering any Program Technology under this Section 7.4; provided, however, if the Filing Party incurs any additional expense as a result of any such request, the Non-Filing Party shall be responsible for the cost and expenses of pursuing any such additional claim or taking such other actions. In addition, Company agrees that if Licensor claims any action taken under Section 7.4(d)(i) would be detrimental to Patent Rights covering Licensor Technology, Licensor shall provide written notice to Company and the Patent Coordinators shall, as promptly as possible thereafter, meet to discuss and resolve such matter and, if they are unable to resolve such matter, the Parties shall refer such matter to a mutually agreeable outside patent counsel for resolution.

  • Assistance and Cooperation After the Closing Date, each of Seller and Purchaser shall:

  • Proprietary Information and Developments 9.1 The Consultant will not at any time, whether during or after the termination of this Agreement for any reason, reveal to any person or entity any of the trade secrets or confidential information concerning the organization, business or finances of the Company or of any third party which the Company is under an obligation to keep confidential, except as may be required in the ordinary course of performing the Consultant Services to the Company, and the Consultant shall keep secret such trade secrets and confidential information and shall not use or attempt to use any such secrets or information in any manner which is designed to injure or cause loss to the Company. Trade secrets or confidential information shall include, but not be limited to, the Company's financial statements and projections, expansion proposals, property acquisition opportunities and business relationships with banks, lenders and other parties not otherwise publicly available.

  • Information Sources The Custodian may rely upon information received from issuers of Investments or agents of such issuers, information received from Subcustodians and from other commercially reasonable sources such as commercial data bases and the like, but shall not be responsible for specific inaccuracies in such information, provided that the Custodian has relied upon such information in good faith, or for the failure of any commercially reasonable information provider.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Intellectual Property and Information Technology (a) Section 5.20(a) of the Company Disclosure Schedule contains a true and complete list, as of the date of this Agreement, of all Company Products.

  • Financial and Business Information The Company shall deliver to each holder of Notes that is an Institutional Investor:

  • OWNERSHIP AND PROTECTION OF INTELLECTUAL PROPERTY AND CONFIDENTIAL INFORMATION 4.1 All information, ideas, concepts, improvements, discoveries, works of authorship, and inventions, whether patentable or copyrightable or not, which are conceived, reduced to practice, authored, made, developed or acquired by Employee, individually or in conjunction with others, in the scope of Employee's employment by Employer or any of its affiliates, and/or during the term of Employee’s employment (whether during business hours or otherwise and whether on Employer's premises or otherwise) which relate to the business, products or services of Employer or its affiliates (including, without limitation, all such information relating to any corporate opportunities, research, financial and sales data, pricing and trading terms, evaluations, opinions, interpretations, acquisition prospects, the identity of customers or their requirements, the identity of key contacts within the customer's organizations or within the organization of acquisition prospects, or marketing and merchandising techniques, prospective names, and marks), and all documents, things, writings and items of any type or in any media embodying any of the foregoing (collectively, “Developments”), and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks, shall be the sole and exclusive property of Employer or its affiliates, as the case may be. Employee hereby assigns to Employer any and all rights Employee might otherwise have in and to any such Developments, and any and all proprietary rights of any kind thereto, including without limitation all rights relating to patents, copyrights, trade secrets, and trademarks.

Time is Money Join Law Insider Premium to draft better contracts faster.