REQUIRED OPERATIONAL ENVIRONMENT FOR SECRET AND TOP SECRET INFORMATION Sample Clauses

REQUIRED OPERATIONAL ENVIRONMENT FOR SECRET AND TOP SECRET INFORMATION. There are at least two key design and implementation scenarios that the Supplier shall consider when bidding for an eDisclosure exercise: a Supplier-hosted closed network service with no internet access, and a Supplier closed network service hosted at the Contracting Authority or their client’s site. The following are the minimum Information Assurance (IA) standards which the Supplier shall meet: Any solution or Service proposed by the Supplier shall, by default, provide greater controls than those in Annex 1, by way of additional mandatory requirements for information marked at SECRET or TOP SECRET. The Contracting Authority shall advise the Supplier of these specific handling caveats. Any solution or Service will be individually accredited by the Contracting Authority and/or its client, with reference to those particular requirements. The Supplier shall ensure that the security of End User Devices (EUDs) - including laptops, and PCs - connecting to their Services meets the relevant information security standards set out below, and in so doing should have specific reference to CESG’s published guidance End User Device Security.
AutoNDA by SimpleDocs

Related to REQUIRED OPERATIONAL ENVIRONMENT FOR SECRET AND TOP SECRET INFORMATION

  • Confidential Information and Restricted Activities Employee has entered into the Company’s Employee Proprietary Information Agreement (“EPIA”) and acknowledges his or her obligations thereunder. The EPIA is specifically incorporated into this Agreement.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? Yes

  • Access to Company Information (a) During the period from the date of this Agreement to the Effective Time, the Company shall permit representatives of the Parent to have reasonable access (at all reasonable times, and in a manner so as not to interfere with the normal business operations of the Company) to all premises, properties, financial and accounting records, contracts, other records and documents, and personnel, of or pertaining to the Company. (b) The Parent and each of its Subsidiaries (i) shall treat and hold as confidential any Company Confidential Information (as defined below), (ii) shall not use any of the Company Confidential Information except in connection with this Agreement, and (iii) if this Agreement is terminated for any reason whatsoever, shall return to the Company all tangible embodiments (and all copies) thereof which are in its possession. For purposes of this Agreement, “Company Confidential Information” means any information of the Company that is furnished to the Parent or any of its Subsidiaries by the Company in connection with this Agreement; provided, however, that it shall not include any information (A) which, at the time of disclosure, is available publicly other than as a result of non-permitted disclosure by the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (B) which, after disclosure, becomes available publicly through no fault of the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (C) which the Parent or any of its Subsidiaries knew or to which the Parent or any of its Subsidiaries had access prior to disclosure, as demonstrated by competent evidence, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company, or (D) which the Parent or any of its Subsidiaries rightfully obtains from a source other than the Company, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company.

  • Treatment of Proprietary and Confidential Information A. Both parties agree that it may be necessary to provide each other during the term of this Agreement with certain confidential information, including trade secret information, including but not limited to, technical and business plans, technical information, proposals, specifications, drawings, procedures, customer account data and like information (hereinafter collectively referred to as “Information”). Both parties agree that all Information shall either be in writing or other tangible format and clearly marked with a confidential, private or proprietary legend, or, when the Information is communicated orally, it shall also be communicated that the Information is confidential, private or proprietary. The Information will be returned to the owner within a reasonable time. Both parties agree that the Information shall not be copied or reproduced in any form. Both parties agree to receive such Information and not disclose such Information. Both parties agree to protect the Information received from distribution, disclosure or dissemination to anyone except employees of the parties with a need to know such Information and which employees agree to be bound by the terms of this Section. Both parties will use the same standard of care to protect Information received as they would use to protect their own confidential and proprietary Information. B. Notwithstanding the foregoing, both parties agree that there will be no obligation to protect any portion of the Information that is either: 1) made publicly available by the owner of the Information or lawfully disclosed by a nonparty to this Agreement; 2) lawfully obtained from any source other than the owner of the Information; or 3) previously known to the receiving party without an obligation to keep it confidential.

  • - CLEC INFORMATION 3.1 Except as otherwise required by law, CenturyLink will not provide or establish Interconnection, Unbundled Network Elements, ancillary services and/or resale of Telecommunications Services in accordance with the terms and conditions of this Agreement prior to CLEC's execution of this Agreement. The Parties shall complete CenturyLink's "New Customer Questionnaire," as it applies to CLEC's obtaining of Interconnection, Unbundled Network Elements, ancillary services, and/or resale of Telecommunications Services hereunder. 3.2 Prior to placing any orders for services under this Agreement, the Parties will jointly complete the following sections of CenturyLink's "New Customer Questionnaire:" General Information Billing and Collection (Section 1) Credit Information Billing Information Summary Billing OSS and Network Outage Notification Contact Information System Administration Contact Information Ordering Information for LIS Trunks, Collocation, and Associated Products (if CLEC plans to order these services) Design Layout Request – LIS Trunking and Unbundled Loop (if CLEC plans to order these services) 3.2.1 The remainder of this questionnaire must be completed within two (2) weeks of completing the initial portion of the questionnaire. This questionnaire will be used to: Determine geographical requirements; Identify CLEC identification codes; Determine CenturyLink system requirements to support CLEC's specific activity; Collect credit information; Obtain Billing information; Create summary bills; Establish input and output requirements; Create and distribute CenturyLink and CLEC contact lists; and Identify CLEC hours and holidays. 3.2.2 CLECs that have previously completed a Questionnaire need not fill out a New Customer Questionnaire; however, CLEC will update its New Customer Questionnaire with any changes in the required information that have occurred and communicate those changes to CenturyLink. Before placing an order for a new product, CLEC will need to complete the relevant New Product Questionnaire and amend this Agreement.

  • Confidential Supervisory Information Notwithstanding any other provision of this Agreement, no disclosure, representation or warranty shall be made (or other action taken) pursuant to this Agreement that would involve the disclosure of confidential supervisory information (including confidential supervisory information as defined in 12 C.F.R. § 261.2(c)) of a Government Authority by any party to this Agreement to the extent prohibited by applicable Law. To the extent legally permissible, appropriate substitute disclosures or actions shall be made or taken under circumstances in which the limitations of the preceding sentence apply.

  • Labor Law Information You acknowledge that if you continue to hold shares of Common Stock acquired under the Plan after an involuntary termination of your employment, you may not be eligible to receive unemployment benefits in Russia. Anti-Corruption Information. Anti-corruption laws prohibit certain public servants, their spouses and their dependent children from owning any foreign source financial instruments (e.g., shares of foreign companies such as the Company). Accordingly, you should inform the Company if you are covered by these laws because you should not hold shares of Common Stock acquired under the Plan.

  • Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!