Isolation of System or Device Sample Clauses

Isolation of System or Device. A system or device, containing County CSP, compromised by an Incident and/or Breach involving an exploitation of a technical vulnerability, shall be promptly disconnected from CDSS’ production environment with access to only individuals who are participating in the investigation, mitigation, and remediation of the Incident and/or Breach. Such system or device shall remain disconnected from the production environment until the risk from the exploited vulnerability has been adequately mitigated. The County must be contacted prior to placing the previously compromised system or device, containing County CSP, back in the production environment. The affected system or device, containing County CSP, shall not be returned to operation in the production environment until the County Information Security and/or Privacy Officer gives its approval.
AutoNDA by SimpleDocs
Isolation of System or Device. A system or device, containing CDSS CSP, compromised by an Incident and/or Breach involving an exploitation of a technical vulnerability, shall be promptly disconnected from Contractor’s production environment with access to only individuals who are participating in the investigation, mitigation, and remediation of the Incident and/or Breach. Such system or device shall remain disconnected from the production environment until the risk from the exploited vulnerability has been adequately mitigated. CDSS must be contacted prior to placing the previously compromised system or device, containing CDSS CSP, back in the production environment. The affected system or device, containing CDSS CSP, shall not be returned to operation in the production environment until the CDSS Information Security and Privacy Officer gives its approval.
Isolation of System or Device. A system or device containing CDSS CSP compromised by an exploitation of a technical vulnerability shall be promptly disconnected or quarantined and investigated until the vulnerability is resolved. Contractor will notify CDSS CSP within two (2) business days of a confirmed exploitation of a technical vulnerability and keep CDSS informed as to the investigation until resolution of the vulnerability is completed.

Related to Isolation of System or Device

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing CSTC traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to CSTC, the subtending arrangements between CSTC Tandem Switches and CSTC End Office Switches shall be the same as the Tandem/End Office subtending arrangements that CSTC maintains for the routing of its own or other carriers’ traffic.

  • Technical Standards Applicable to a Wind Generating Plant i. Low Voltage Ride-Through (LVRT) Capability A wind generating plant shall be able to remain online during voltage disturbances up to the time periods and associated voltage levels set forth in the standard below. The LVRT standard provides for a transition period standard and a post-transition period standard.

  • Network Interface Device 2.7.1 The NID is defined as any means of interconnection of the End User’s customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single line termination device or that portion of a multiple line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable.

Time is Money Join Law Insider Premium to draft better contracts faster.