Rules of Behavior. The Contractor shall ensure that all employees, including subcontractor employees, comply with the NIH Information Technology General Rules of Behavior (xxxxx://xxxx.xxx.xxx/InfoSecurity/training/Pages/nihitrob.aspx), which are contained in the NIH Information Security Awareness Training Course xxxx://xxxxxxxxxxxxxx.xxx.xxx.
Rules of Behavior. 1. The Contractor (and/or any subcontractor) shall ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior, and comply with the NIH Information Technology General Rules of Behavior xxxxx://xxxx.xxx.xxx/InfoSecurity/training/Pages/nihitrob.aspx, which are contained in the NIH Information Security Awareness Training Course xxxx://xxxxxxxxxxxxxx.xxx.xxx
2. All Contractor employees performing on the contract must read and adhere to the Rules of Behavior before accessing Department data or other information, systems, and/or networks that store/process government information, initially at the beginning of the contract and at least annually thereafter, which may be done as part of annual NIH Information Security Awareness Training. If the training is provided by the contractor, the signed Rules of Behavior must be provided as a separate deliverable to the CO and/or COR per defined timelines above.
Rules of Behavior. If You purchase Xxxxxx’s FedRAMP SaaS Environment then You, along with Your system administrators, employees, contractors, end-users, and other third parties who are given access to the FedRAMP SaaS Environment, are subject to the FedRAMP Rules of Behavior located at xxxx://xxx.xxxxxx.xxx/company/legal/fedramp.
Rules of Behavior. CMS shall: The Non-CMS Organization shall:
Rules of Behavior. Rules of Behavior are part of a comprehensive program to provide complete information security. These guidelines were established to hold users accountable for their actions and responsible for information security. Rules of Behavior establish █HH█UU█DD█--22█55█2222█288█((█0055█//22█00█222█2)) standards of behavior in recognition of the fact that knowledgeable users are the foundation of a successful security program. Users need to understand that taking personal responsibility for the security of their computer and the data it contains is an essential part of their job.
Rules of Behavior. EGS and <<VENDOR SYSTEM>> users are expected to protect data in accordance with the policies and standards of the Privacy Act, OMB A-130 and each systems prospective Rules of Behavior document.
Rules of Behavior a. The Contractor (and/or any subcontractor) must ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior and HHS Rules of Behavior for Privileged Users.
b. All Contractor employees performing on the contract must read and adhere to the Rules of Behavior before accessing Department data or other information, systems, and/or networks that store/process government information, initially at the beginning of the contract and at least annually thereafter, which may be done as part of annual HHS/OASH Information Security Awareness Training. If the training is provided by the contractor, the signed XXX must be provided as a separate deliverable to the CO and/or COR per defined timelines above.
Rules of Behavior. Both parties shall ensure that all users with access to the CMS Network, the CMS information system, the Non-CMS Organization network and any data received from the other organization shall adhere to all current HHS Rules of Behavior (RoB) (For Use of Technology Resources and Information), which is available at xxxxx://xxx.xxx.xxx/Research-Statistics-Data-and-Systems/CMS-Information-Technology/InformationSecurity/Info-Security-Library-Items/HHS-Rules-of-Behavior-for-Use-of-HHS-Information-and-IT-Resources-Policy.html?DLPage=1&DLEntries=10&DLFilter=rule&DLSort=0&DLSortDir=ascending
Rules of Behavior. If You purchase Ivanti’s FedRAMP SaaS Environment then You, along with Your system administrators, employees, contractors, end-users, and other third parties who are given access to the FedRAMP SaaS Environment, are subject to the FedRAMP Rules of Behavior located at xxxx://xxx.xxxxxx.xxx/company/legal/fedramp.
Rules of Behavior. The following are examples of infractions of rules of conduct that may result in disciplinary action, up to and including termination of employment. This is not a complete list.