Principles of Security. 2.1 The Supplier acknowledges that the Customer places great emphasis on the confidentiality, integrity and availability of information and consequently on the security provided by the ISMS. 2.2 The Supplier shall be responsible for the effective performance of the ISMS and shall at all times provide a level of security which: 2.2.1 is in accordance with Good Industry Practice, Law and this Contract; 2.2.2 complies with the Security Policy; 2.2.3 meets any specific security threats to the ISMS; 2.2.4 complies with the security requirements as set out in paragraph 2.5 of the Order Form; and 2.2.5 complies with the Customer‟s ICT standards. 2.3 Subject to clause 21.1.3, the references to standards, guidance and policies set out in paragraph 2.2 shall be deemed to be references to such items as developed and updated and to any successor to or replacement for such standards, guidance and policies, from time to time. 2.4 In the event of any inconsistency in the provisions of the above standards, guidance and policies, the Supplier should notify the Customer's Representative of such inconsistency immediately upon becoming aware of the same, and the Customer's Representative shall, as soon as practicable, advise the Supplier which provision the Supplier shall be required to comply with.
Appears in 6 contracts
Samples: Framework Agreement, Framework Agreement, Framework Agreement
Principles of Security. 2.1 The Supplier acknowledges that the Customer places great emphasis on the confidentiality, integrity and availability of information and consequently on the security provided by the ISMS.
2.2 The Supplier shall be responsible for the effective performance of the ISMS and shall at all times provide a level of security which:
2.2.1 is in accordance with Good Industry Practice, Law and this Contract;
2.2.2 complies with the Security Policy;
2.2.3 complies with at least the minimum set of security measures and standards as determined by the Security Policy Framework (Tiers 1-4) available from the Cabinet Office Security Policy Division (COSPD);
2.2.4 meets any specific security threats to the ISMS;
2.2.4 2.2.5 complies with ISO/IEC 27001 and ISO/IEC 27002 in accordance with paragraph 4.4 of this schedule;
2.2.6 complies with the security requirements as set out in paragraph 2.5 of the Order Form; and
2.2.5 2.2.7 complies with the Customer‟s Customer’s ICT standards.
2.3 Subject to clause 21.1.319.1.3, the references to standards, guidance and policies set out in paragraph 2.2 2.1 shall be deemed to be references to such items as developed and updated and to any successor to or replacement for such standards, guidance and policies, from time to time.
2.4 In the event of any inconsistency in the provisions of the above standards, guidance and policies, the Supplier should notify the Customer's Representative of such inconsistency immediately upon becoming aware of the same, and the Customer's Representative shall, as soon as practicable, advise the Supplier which provision the Supplier shall be required to comply with.
Appears in 3 contracts
Samples: Works Order, Order Form, Framework Agreement
Principles of Security. 2.1 The Supplier acknowledges that the Customer places great emphasis on the confidentiality, integrity and availability of information and consequently on the security provided by the ISMS.
2.2 The Supplier shall be responsible for the effective performance of the ISMS and shall at all times provide a level of security which:
2.2.1 is in accordance with Good Industry Practice, Law and this Contract;
2.2.2 complies with the Security Policy;
2.2.3 meets any specific security threats to the ISMS;
2.2.4 complies with the security requirements as set out in paragraph 2.5 of the Order Form; and
2.2.5 complies with the Customer‟s Customer’s ICT standards.
2.3 Subject to clause 21.1.3, the references to standards, guidance and policies set out in paragraph 2.2 shall be deemed to be references to such items as developed and updated and to any successor to or replacement for such standards, guidance and policies, from time to time.
2.4 In the event of any inconsistency in the provisions of the above standards, guidance and policies, the Supplier should notify the Customer's Representative of such inconsistency immediately upon becoming aware of the same, and the Customer's Representative shall, as soon as practicable, advise the Supplier which provision the Supplier shall be required to comply with.
Appears in 2 contracts
Samples: Framework Agreement, Framework Agreement
Principles of Security. 2.1 The Supplier acknowledges that the Customer places great emphasis on the confidentiality, integrity and availability of information and consequently on the security provided by the ISMSsecurity.
2.2 The Supplier shall be responsible for the effective performance of the ISMS its security obligations and shall at all times provide a level of security which:
2.2.1 is in accordance with Good Industry Practice, Law and this Call Off Contract;
2.2.2 complies with the Security Policy;
2.2.3 meets any specific security threats to the ISMS;
2.2.4 complies with the security requirements as set out in paragraph 2.5 of the Order FormAnnex 1 to this Call Off Schedule; and
2.2.5 2.2.4 complies with the Customer‟s Customer's ICT standards.
2.3 Subject to clause 21.1.3Clause 12 (Standards and Quality), the references to standards, guidance and policies set out in paragraph 2.2 shall be deemed to be references to such items as developed and updated and to any successor to or replacement for such standards, guidance and policies, from time to time.
2.4 In the event of any inconsistency in the provisions of the above standards, guidance and policies, the Supplier should notify the Customer's Representative of such inconsistency immediately upon becoming aware of the same, and the Customer's Representative shall, as soon as practicable, advise the Supplier which provision the Supplier shall be required to comply with.
Appears in 1 contract
Samples: Call Off Agreement