Rules of Behavior. The Contractor shall ensure that all employees, including subcontractor employees, comply with the NIH Information Technology General Rules of Behavior (xxxxx://xxxx.xxx.xxx/InfoSecurity/training/Pages/nihitrob.aspx), which are contained in the NIH Information Security Awareness Training Course xxxx://xxxxxxxxxxxxxx.xxx.xxx. (Include subparagraph 3 below if the delivery order includes the Clause at HHSAR 352.239-72, Security Requirements for Federal Information Technology Resources.)
Rules of Behavior. Users are bound by USDA policy and guidelines. USDA employees and contractors are required to complete the annual USDA Security Awareness Training and pass a background investigation. The system security controls must be enforced, and audit logging must be enforced. No new or additional security awareness or training requirements are needed as a result of implementing the interconnections between the systems identified in this agreement. All users and administrators are expected to protect the information transmitted in accordance with all required laws, regulations, and NIST guidance. Both parties agree to work together to ensure the joint security of the connected systems and the data they store, process, and transmit. Each party certifies that its respective system is designed, managed, and operated in compliance with all relevant agency regulations, official guidance, and policies. As part of assuring this compliance for the security and benefit of each partner organization, thorough review of each system’s SSPs, has been performed.
Rules of Behavior. CMS shall: Ensure that all CMS system users with access to the CMS Network shall adhere to all current HHS Rules of Behavior.11 The Non-CMS Organization shall: Require that all users with access to the Non-CMS Organization’s system and its connection with the Hub, adhere to the terms of this ISA and the EDE Agreement executed between the Non-CMS Organization and CMS. Require the Non-CMS Organization’s Rules of Behavior provide protections that are commensurate with current HHS Rules of Behavior.
Rules of Behavior. If You purchase Xxxxxx’s FedRAMP SaaS Environment then You, along with Your system administrators, employees, contractors, end-users, and other third parties who are given access to the FedRAMP SaaS Environment, are subject to the FedRAMP Rules of Behavior located at xxxx://xxx.xxxxxx.xxx/company/legal/fedramp.
Rules of Behavior. 1) The Contractor (and/or any subcontractor) shall ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior.
Rules of Behavior. Rules of Behavior are part of a comprehensive program to provide complete information security. These guidelines were established to hold users accountable for their actions and responsible for information security. Rules of Behavior establish █HH█UU█DD█--22█55█2222█288█((█0055█//22█00█222█2)) standards of behavior in recognition of the fact that knowledgeable users are the foundation of a successful security program. Users need to understand that taking personal responsibility for the security of their computer and the data it contains is an essential part of their job.
Rules of Behavior. According to the conditions of stay in the Center, during the recovery course, the CLIENT is strictly forbidden:
Rules of Behavior. Both parties shall ensure that all users with access to the CMS Network, the CMS information system, the Non-CMS Organization network and any data received from the other organization shall adhere to all current HHS Rules of Behavior (RoB) (For Use of Technology Resources and Information), which is available at xxxxx://xxx.xxx.xxx/Research-Statistics-Data-and-Systems/CMS-Information-Technology/InformationSecurity/Info-Security-Library-Items/HHS-Rules-of-Behavior-for-Use-of-HHS-Information-and-IT-Resources-Policy.html?DLPage=1&DLEntries=10&DLFilter=rule&DLSort=0&DLSortDir=ascending
Rules of Behavior. DO make only truthful statements or xxxxxxxx.XX use good judgment and caution when posting messages to the Exchange. Information posted on the Exchange is available for all to see, and comments are subject to various laws. Your actions can subject you and your institution, company, or organization to liability. DO comply with all applicable laws and regulations regarding your use of the Exchange, including defamation, copyright and antitrust laws. A brief description of these laws is described below under "Legal Statements." DO use the Exchange to engage in discussions related to the college admission process. DO be respectful of other Subscribers and their opinions. DO use good Exchange etiquette (see below). DO NOT quote any Exchange message without prior approval from the person who posted the message. DO NOT post anything in a Exchange message that you would not want the world to see or that you would not want anyone to know came from you. DO NOT retransmit, publicly display, sell or use the Content (as defined in Legal Statements, Item 6, below) other than solely for your personal use. DO NOT use the Exchange to post or transmit any material that violates or infringes in any way upon the rights of others (such as copyright infringement) that is unlawful, threatening, abusive, defamatory, invasive of privacy or publicity rights, vulgar, obscene, profane, abusive or otherwise objectionable that encourages conduct that would constitute a criminal offense, gives rise to civil liability or otherwise violate any law. DO NOT post any confidential information or any information that would infringe upon the proprietary, privacy or personal rights of others. DO NOT distribute, post, publish or communicate any material that contains promotional, commercial or advertising messages except those specifically permitted in Section IV.C. of this agreement.
Rules of Behavior. EGS and <<VENDOR SYSTEM>> users are expected to protect data in accordance with the policies and standards of the Privacy Act, OMB A-130 and each systems prospective Rules of Behavior document.