IT Security Plan Sample Clauses

IT Security Plan. The Contractor shall develop, provide, implement, and maintain an IT Security Plan. This plan shall describe the processes and procedures that will be fol- lowed to ensure appropriate security of IT resources that are developed, processed, or used under this contract. The plan shall de- scribe those parts of the contract to which this clause applies. The Contractor’s IT Se- curity Plan shall comply with applicable Federal laws that include, but are not lim- ited to, 40 U.S.C. 11331, the Federal Informa- tion Security Management Act (FISMA) of 2002, and the E-Government Act of 2002. The plan shall meet IT security requirements in accordance with Federal and DOS policies and procedures, as they may be amended from time to time during the term of this contract that include, but are not limited to:
AutoNDA by SimpleDocs
IT Security Plan. The Contractor shall develop, provide, implement, and maintain an IT Security Plan. This plan shall describe the processes and procedures that will be fol- lowed to ensure appropriate security of IT resources that are developed, processed, or used under this contract. The plan shall de- scribe those parts of the contract to which this clause applies. The Contractors IT Secu- rity Plan shall comply with applicable Fed- eral laws that include, but are not limited to, 40 U.S.C. 11331, the Federal Information Security Management Act (FISMA) of 2002, and the E-Government Act of 2002. The plan shall meet IT security requirements in ac- cordance with Federal and GSA policies and procedures. GSA’s Office of the Chief Infor- mation Officer issued ‘‘CIO IT Security Pro- cedural Guide 09–48, Security Language for Information Technology Acquisitions Ef- forts,’’ to provide IT security standards, poli- cies and reporting requirements. This docu- ment is incorporated by reference in all so- licitations and contracts or task orders where an information system is contractor owned and operated on behalf of the Federal Government. The guide can be accessed at http:// .xxx.xxx/xxxxxx/xxxxxxxx/00000. Spe- cific security requirements not specified in ‘‘CIO IT Security Procedural Guide 09–48, Se- curity Language for Information Technology Acquisitions Efforts’’ shall be provided by the requiring activity.
IT Security Plan all Authorized TCP Individuals will comply with the standards, procedures, or policies outlined below for IT security: All MCTD is considered Category I (Confidential) Data and will be maintained in accordance with UTA’s Minimum Standards pertaining to backups, change management, virus protection, physical access, and system hardening: xxxxx://xxx.xxx.xxx/security/security_standards/servers_workstations/index.php MCTD will be stored in a UTA-sanctioned data storage location: xxxxx://xxx.xxx.xxx/security/approved_storage/index.php. MCTD in electronic format will be protected by password and will comply with UTA’s password security standards: xxxxx://xxx.xxx.xxx/security/password/index.php. Use of portable/external storage devices such as flash drives or laptops will comply with UTA’s standards for Security: xxxxx://xxx.xxx.xxx/security/usb_security/index.php. In addition, if a portable media or storage device is removed from the approved location (1.a.), it will remain within the Authorized TCP Individual’s “effective controlat all times via the following procedures:
IT Security Plan. The Contractor shall develop, provide, implement, and maintain an IT Security Plan. This plan shall describe the processes and procedures that will be followed to ensure appropriate security of IT resources that are developed, processed, or used under this contract. The plan shall describe those parts of the contract to which this clause applies. The Contractors IT Security Plan shall comply with applicable Federal laws that include, but are not limited to, 40 U.S.C. 11331, the Federal Information Security Management Act (FISMA) of 2002, and the E-Government Act of 2002. The plan shall meet IT security requirements in accordance with Federal and GSA policies and procedures. GSA’s Office of the Chief Information Officer issued “CIO IT Security Procedural Guide 09–48, Security Language for Information Technology Acquisitions Efforts,” to provide IT security standards, policies and reporting requirements. This document is incorporated by reference in all solicitations and contracts or task orders where an information system is contractor owned and operated on behalf of the Federal Government. The guide can be accessed at xxxx://xxx.xxx.xxx/portal/category/25690. Specific security requirements not specified in “CIO IT Security Procedural Guide 09–48, Security Language for Information Technology Acquisitions Efforts” shall be provided by the requiring activity.

Related to IT Security Plan

  • Security Plan The Operator shall develop and execute a security plan that meets the requirements of this Agreement and Article 7. The Operator shall document in the security plan the process used to ensure information systems including hardware, software, applications, and general support systems have effective security safeguards, which have been implemented, planned for, and documented. The Operator shall deliver a copy of the plan to the RIRs after each annual update.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Employment Security and Income Maintenance Plan 21.1 The provisions of the governing Supplemental Agreement shall apply with respect to the Employment Security and Income Maintenance Plan.

  • SEB Plan The parties agree to establish and administer a Supplemental Employment Benefits Plan (the “Plan”) as follows:

  • Transition Plan In the event of termination by the LHIN pursuant to this section, the LHIN and the HSP will develop a Transition Plan. The HSP agrees that it will take all actions, and provide all information, required by the LHIN to facilitate the transition of the HSP’s clients.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Leave Plan Effective April the Hospital agrees to introduce a leave program, funded solely by the nurse, subject to the following terms and conditions:

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

Time is Money Join Law Insider Premium to draft better contracts faster.