Operational Security Sample Clauses

Operational Security. Operational Security (OPSEC) is a preventive approach to ensuring U.S. interests are protected from enemy intelligence or actions. The Performer shall incorporate OPSEC measures expressed by the Center for Development of Security Excellence, Defense Security Service in the OPSEC Awareness for Military Members, DoD Employees and Contractors accessed at xxxxx://xxxxxxxxxxxxxxxxx.xxxxxxxxxxx.xxx/opsec/ when discussing this contract, customer, prototype, or information contained within the SOW. On September 21, 2001, the DoD designated Headquarters USSOCOM a sensitive unit, as defined by Title 00 Xxxxxx Xxxxxx Code (USC) Section 552 (10 USC §552). In keeping with this designation, unclassified information related to USSOCOM military technology acquisitions managed by USSOCOM or any of its component commands, will be designated Controlled Unclassified Information (CUI). As such, the Performer hereby unequivocally agrees that it shall not release to anyone outside the Performer's organization any unclassified information, regardless of medium (e.g., film, tape, document, PERFORMER’s external website, newspaper, magazine, journal, corporate annual report, etc.), pertaining to any part of this agreement, unless the AO has given prior written approval. Therefore, any release of information which associates USSOCOM, SOF, or any component command with an acquisition program, performer, or this agreement is prohibited unless specifically authorized by USSOCOM. Notwithstanding the above, technical content under Attachments 1 or 2 are excluded from this designation, providing that the performer provides a copy of the unclassified information for release to the AO at least 45 days before the proposed date for release. Requests for approval shall identify the specific information to be released, the medium to be used, and the purpose for the release. The Performer shall submit its request to the AO at least 45 days before the proposed date for release for approval. No release of any restricted information shall be made without specific written authorization by the AO. The Performer further understands that Title 18 USC Section 701 specifically prohibits the use of the USSOCOM emblem or logo in any medium (e.g., corporate website, marketing brochure, newspaper, magazine, etc.) unless authorized in writing by USSOCOM. Forward any requests to use the USSOCOM emblem or logo through the Contracting Officer. Furthermore, by entering into this Agreement, the Government neither d...
AutoNDA by SimpleDocs
Operational Security. Sysdig maintains a set of physical security policies, processes and procedures based on industry best practices that govern physical security and environmental controls (e.g. badging, escorting) used to both guard Sysdig’s systems and scoped data, and to govern visitors to Sysdig’s physical locations and facilities. Sysdig maintains a change management process to monitor changes to information systems, network devices, system components, physical and environment changes, and software development.
Operational Security. ● Hubilo runs an annual training program for its employees to treat data protection and security as the highest priorities. Hubilo is committed to implement tighter security standards across policies, procedures, technology, and people on an ongoing basis. ● Hubilo runs Vulnerability Assessment Penetration Testing (VAPT) on a quarterly basis through a third-party service provider, Xxxxx Xxxxxxxx LLP, who is globally empaneled with Computer Emergency Response and operate ● Applications and servers are regularly patched to provide ongoing protection from exploits with the help of a robust Change Management process in place. ● Hubilo has a disaster recovery strategy in place, which is tested on a yearly basis. Under any DR condition, our customer’s websites will not get affected and will work fine. Though the data collection might get stopped until Hubilo services are restored. ● All of Hubilo’s customer data is hosted in a secure cloud data centre service provider (AWS) and also logically segregated by the Hubilo application. ● xxxxx://xxx.xxxxxx.xxx/sub-processors [1] Where the data exporter is a processor subject to Regulation (EU) 2016/679 acting on behalf of a Union institution or body as controller, reliance on these Clauses when engaging another processor (sub-processing) not subject to Regulation (EU) 2016/679 also ensures compliance with Article 29(4) of Regulation (EU) 2018/1725 of the European Parliament and of the Council of 23 October 2018 on the protection of natural persons with regard to the processing of personal data by the Union institutions, bodies, offices and agencies and on the free movement of such data, and repealing Regulation (EC) No 45/2001 and Decision No 1247/2002/EC (OJ L 295 of 21.11.2018, p. 39), to the extent these Clauses and the data protection obligations as set out in the contract or other legal act between the controller and the processor pursuant to Article 29(3) of Regulation (EU) 2018/1725 are aligned. This will in particular be the case where the controller and processor rely on the standard contractual clauses included in Decision C(2021) 3972 final. [2] The Agreement on the European Economic Area (EEA Agreement) provides for the extension of the European Union's internal market to the three EEA States Iceland, Liechtenstein and Norway. The Union data protection legislation, including Regulation (EU) 2016/679, is covered by the EEA Agreement and has been incorporated into Annex XI thereto. Therefore, any disclosure ...
Operational Security. ARTICLE XII Cyber Security and Incident Reporting ARTICLE XIII Foreign Access to Technology
Operational Security. 10.1 The Data Processor will ensure formal procedures are implemented to manage technical threats, vulnerabilities and malware including applying vendor supplied security updates (patches) within recommended timeframes and anti malware products are installed, updated and maintained.
Operational Security. 2.3.2 NASPAXRIVERINST 5100.35C Occupational Safety and Health (OSH) Manual.‌
AutoNDA by SimpleDocs
Operational Security. ARTICLE XII Cyber Security and Incident Reporting ARTICLE XIII Foreign Access to Technology ARTICLE XIV Hazardous Material Identification and Material Safety Data
Operational Security. ● Hubilo runs an annual training program for its employees to treat data protection and security as the highest priorities. Hubilo is committed to implement tighter security standards across policies, procedures, technology, and people on an ongoing basis.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!