MANAGEMENT SECURITY CONTROLS Sample Clauses

MANAGEMENT SECURITY CONTROLS. 1. The state CS agency shall establish and/or maintain ongoing management oversight and quality assurance capabilities to ensure that only authorized personnel have access to FPLS information and CS program information. Policy/Requirements Traceability: National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Rev 4, Recommended Security Controls for Federal Certification Guide, Chapter III, H2 2. The state child support agency shall advise all authorized personnel who will access FPLS information and confidential child support program information of the confidentiality of the information, the safeguards required to protect the information, and the civil and criminal sanctions for non-compliance contained in the applicable state and federal laws. Policy/Requirements Traceability: National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Rev 4, Recommended Security Controls for Federal Information Systems and Organizations, PL-4, PS-6, PS-8; section 453(l)(2) of the Social Security Act. 42 U.S.C. § 653(l)(2), 654 (26); 45 CFR 95.621(f); 45 CFR 307.10(b)(11); 45 CFR 307.11(b)(2)(iii); 45 CFR 307.13; and Federal Certification Guide, Chapter III, H2 3. The state CS agency shall prohibit the use of non-state furnished equipment to access FPLS information and CS program information without specific written authorization for use of the equipment from the appropriate state CS agency representatives. Policy/Requirements Traceability: NIST SP 800-53 Rev 4, AC-20(1)(2), HHS OCIO Policy for IS2P Handbook 4. The state CS agency shall require that personnel accessing FPLS information remotely, for example, telecommuting, adhere to all the security and privacy safeguarding requirements provided in this security agreement. State and non-state furnished equipment shall have appropriate software with the latest updates to protect against attacks, including, at a minimum, current antivirus software and up-to-date system patches and other software patches. Prior to electronic connection to state CS agency systems, the state CS agency shall scan the state and non-state furnished equipment to ensure compliance with a set of standards developed by the state CS agency. All connections shall be through a Network Access Control solution and all data in transit between the remote location and the state CS agency shall be encrypted using Federal Information Processing Standards (FIPS) 140-2 encryption standards. See Sections II....
AutoNDA by SimpleDocs
MANAGEMENT SECURITY CONTROLS. 1. The state agency must establish and maintain an ongoing management oversight and quality assurance program to ensure that only authorized personnel have access to FPLS information and child support program information. Policy/Requirements Traceability: 5 U.S.C. § 552a; NIST Special Publication (SP) 800-53 Rev 5, Security and Privacy Controls for Federal Information Systems and Organizations, AC-3, AC-6, PL-4(1), PS-6, PS-8; 45 C.F.R. §§ 307.13(a) and (b), 95.621(f), and 307.10(b)(11); Federal Certification Guide, Chapter III, H-2 2. The state agency must advise all authorized personnel who will access FPLS and child support program information of the confidentiality of the information, the safeguards required to protect the information, and the civil and criminal sanctions for non-compliance contained in the applicable state and federal laws, including section 453(l)(2) of the Social Security Act. 42 U.S.C. § 653(l)(2). 307.11(b)(2)(iii), and 307.13; Federal Certification Guide, Chapter III, H-2 3. The state agency must prohibit the use of non-state furnished equipment to access FPLS information and child support program information without specific written authorization for use of the equipment from the appropriate state agency representatives. Policy/Requirements Traceability: NIST SP 800-53 Rev 5, AC-20(1)(2); HHS Policy for Information Security and Privacy Protection (IS2P) 4. The state agency must require that personnel accessing FPLS information remotely, for example, telecommuting, adhere to all the security and privacy safeguarding requirements provided in this security agreement. State and non-state furnished equipment must have appropriate software with the latest updates to protect against attacks, including, at a minimum, current antivirus software and up-to-date system patches and other software patches. Before electronic connection to state agency systems, the state agency must scan the state and non-state furnished equipment to ensure compliance with a set of standards developed by the state agency. All remote connections must be through Network Access Control, and all data in transit between the remote location and the state agency must be encrypted using FIPS 140-3 encryption standards. See Sections II.A.3, II.C.2 through C.5 and VI of this security agreement for additional information.

Related to MANAGEMENT SECURITY CONTROLS

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • MANAGEMENT SECURITY Section 1. The Federation hereby accepts liability for any damage to or loss of state property that is the proximate cause of action taken by striking employees of any bargaining unit, provided however, that liability under this Section shall be restricted to physical damage to real and personal property, and shall not include any alleged loss of revenue or other incidental or punitive damage sought by the Employer.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Management and Control of the Company The Manager shall direct, manage and control the business of the Company to the best of such Manager’s ability and shall have full and complete authority, power and discretion to make any and all decisions and to do any and all things which the Manager shall deem to be reasonably required in light of the Company’s business and objectives. (1) No Member except one who shall also be a Manager may participate in or have any control over the Company business or have any authority or right to act for or bind the Company. The Member hereby consents to the exercise by the Manager of the powers respectively conferred on it by this Agreement. (2) The Manager may, if appropriate, establish, if Company funds are available, reserves for working capital and for payment of taxes, insurance, debt service, repairs, replacements or renewals, or other costs and expenses incident to the operation of the Company and the property of the Company and for such other purposes as the Manager may determine and thereafter shall maintain such reserves in such amounts as the Manager deems appropriate under the circumstances to the extent that any such reserves are not in conflict with any other provisions of this Agreement regarding any required disbursements.

  • Management and Control Systems Grantee will: 1. maintain an appropriate contract administration system to ensure that all terms, conditions, and specifications are met during the term of the contract through the completion of the closeout procedures. 2. develop, implement, and maintain financial management and control systems that meet or exceed the requirements of Uniform Statewide Accounting System (UGMS). Those requirements and procedures include, at a minimum, the following: i. Financial planning, including the development of budgets that adequately reflect all functions and resources necessary to carry out authorized activities and the adequate determination of costs; ii. Financial management systems that include accurate accounting records that are accessible and identify the source and application of funds provided under each Contract of this Contract, and original source documentation substantiating that costs are specifically and solely allocable to a Contract and its Contract and are traceable from the transaction to the general ledger; iii. Effective internal and budgetary controls; iv. Comparison of actual costs to budget; determination of reasonableness, allowableness, and allocability of costs; v. Timely and appropriate audits and resolution of any findings; vi. Billing and collection policies; and vii. Mechanism capable of billing and making reasonable efforts to collect from clients and third parties.

  • Cash Management Systems On or prior to the Closing Date, Borrowers will establish and will maintain until the Termination Date, the cash management systems described in Annex C (the “Cash Management Systems”).

  • Replacement Securities If the Holder of a Security claims that the Security has been mutilated, destroyed, lost or stolen, the Corporation may issue and the Trustee shall authenticate a replacement Security with identical terms as the Securities exchanged if the requirements of Section 8-405 of the Uniform Commercial Code (or any successor provision) are met. Such Holder shall furnish an indemnity bond sufficient in the judgment of the Corporation and the Trustee to protect the Corporation, the Trustee, the Paying Agent, the Registrar and any co-registrar from any loss which any of them may suffer if a Security is replaced. The Corporation and the Trustee may charge for their expenses in replacing a Security. In case any such mutilated, destroyed, lost or stolen Security has become due and payable, the Corporation in its discretion may, instead of issuing a new Security, pay such Security (without surrender thereof except in the case of a mutilated Security) if the applicant for such payment shall furnish to the Corporation, the Trustee, the Paying Agent, the Registrar and any co-registrar for such Security such security or indemnity as may be required by them to hold each of them harmless, and in case of destruction, loss or theft, evidence satisfactory to the Corporation, the Trustee, the Paying Agent, the Registrar and any co-registrar, and any agent of any of them, of the destruction, loss or theft of such Security and the ownership thereof. Upon the issuance of any new Security under this Section 2.09, the Corporation may require the payment of a sum sufficient to cover any tax or other governmental charge that may be imposed in relation thereto and any other expenses (including all fees and expenses of the Trustee, the Paying Agent, the Registrar and any co-registrar for such Security) connected therewith. Every new Security issued pursuant to this Section 2.09 in lieu of any destroyed, lost or stolen Security or in exchange for any mutilated Security, shall constitute an original additional obligation of the Corporation, whether or not the destroyed, lost or stolen Security shall be at any time enforceable by anyone, and shall be entitled to all the benefits of this Indenture equally and proportionately with any and all other Securities. The provisions of this Section 2.09 are exclusive and shall preclude (to the extent lawful) all other rights and remedies with respect to the replacement or payment of mutilated, destroyed, lost or stolen Securities.

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Investment Management Services (a) The Manager shall manage the Fund’s assets subject to and in accordance with the investment objectives and policies of the Fund and any directions which the Trust’s Board of Trustees may issue from time to time. In pursuance of the foregoing, the Manager shall make all determinations with respect to the investment of the Fund’s assets and the purchase and sale of its investment securities, and shall take such steps as may be necessary to implement the same. Such determinations and services shall include determining the manner in which any voting rights, rights to consent to corporate action and any other rights pertaining to the Fund’s investment securities shall be exercised. The Manager shall render or cause to be rendered regular reports to the Trust, at regular meetings of its Board of Trustees and at such other times as may be reasonably requested by the Trust’s Board of Trustees, of (i) the decisions made with respect to the investment of the Fund’s assets and the purchase and sale of its investment securities, (ii) the reasons for such decisions and (iii) the extent to which those decisions have been implemented. (b) The Manager, subject to and in accordance with any directions which the Trust’s Board of Trustees may issue from time to time, shall place, in the name of the Fund, orders for the execution of the Fund’s securities transactions. When placing such orders, the Manager shall seek to obtain the best net price and execution for the Fund, but this requirement shall not be deemed to obligate the Manager to place any order solely on the basis of obtaining the lowest commission rate if the other standards set forth in this section have been satisfied. The parties recognize that there are likely to be many cases in which different brokers are equally able to provide such best price and execution and that, in selecting among such brokers with respect to particular trades, it is desirable to choose those brokers who furnish research, statistical, quotations and other information to the Fund and the Manager in accordance with the standards set forth below. Moreover, to the extent that it continues to be lawful to do so and so long as the Board of Trustees determines that the Fund will benefit, directly or indirectly, by doing so, the Manager may place orders with a broker who charges a commission for that transaction which is in excess of the amount of commission that another broker would have charged for effecting that transaction, provided that the excess commission is reasonable in relation to the value of “brokerage and research services” (as defined in Section 28(e)(3) of the Securities Exchange Act of 1934) provided by that broker. Accordingly, the Trust and the Manager agree that the Manager shall select brokers for the execution of the Fund’s transactions from among: (i) Those brokers and dealers who provide quotations and other services to the Fund, specifically including the quotations necessary to determine the Fund’s net assets, in such amount of total brokerage as may reasonably be required in light of such services; and (ii) Those brokers and dealers who supply research, statistical and other data to the Manager or its affiliates which the Manager or its affiliates may lawfully and appropriately use in their investment management capacities, which relate directly to securities, actual or potential, of the Fund, or which place the Manager in a better position to make decisions in connection with the management of the Fund’s assets and securities, whether or not such data may also be useful to the Manager and its affiliates in managing other portfolios or advising other clients, in such amount of total brokerage as may reasonably be required. (c) The Manager shall render regular reports to the Trust, not more frequently than quarterly, of how much total brokerage business has been placed by the Manager, on behalf of the Fund, with brokers falling into each of the categories referred to above and the manner in which the allocation has been accomplished. (d) The Manager agrees that no investment decision will be made or influenced by a desire to provide brokerage for allocation in accordance with the foregoing, and that the right to make such allocation of brokerage shall not interfere with the Manager’s paramount duty to obtain the best net price and execution for the Fund. (e) Decisions on proxy voting shall be made by the Manager unless the Board of Trustees determines otherwise. Pursuant to its authority, the Manager shall have the power to vote, either in person or by proxy, all securities in which the Fund may be invested from time to time, and shall not be required to seek or take instructions from the Fund with respect thereto. The Manager shall not be expected or required to take any action other than the rendering of investment-related advice with respect to lawsuits involving securities presently or formerly held in the Fund, or the issuers thereof, including actions involving bankruptcy. In the case of class action suits involving issuers held in the Fund, the Manager may include information about the Fund for purposes of participating in any settlements.

  • Collateral Account and Security Interest At any time when Fund’s assets are below $15 million, the Advisor, for value received, hereby pledges, assigns, sets over and grants to the Trust a continuing security interest in and to an account to be established and maintained by the Advisor with the Securities Intermediary and designated as a collateral account (the “Collateral Account”), including any replacement account established with any successor, together with all dividends, interest, stock-splits, distributions, profits and all cash and non-cash proceeds thereof and any and all other rights as may now or hereafter derive or accrue therefrom (collectively, the “Collateral”) to secure the payment of any required Fund Reimbursement Payment or Liquidation Expenses (as defined in Paragraph 5 of this Agreement). For so long as this Agreement is in effect, any transfers or conveyances of Collateral to any party shall require the approval of the Board of Trustees of the Trust (the “Board”), except as specified in Section 7(a)(ii) of this Agreement, below. In addition, the Trust will not issue entitlement orders, redeem or otherwise take any action with respect to the Collateral or Collateral Account unless a Collateral Event (defined below under Section 5 of this Agreement) has occurred or is continuing.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!