Security and Assurance Sample Clauses

Security and Assurance. 10.17.1. In managing the information provided, all parties will:  Use the information only for the purposes described in this MoU;  Continue to hold the information only as long as there is a business need to keep it;  Ensure that only civil servants, special advisors, Ministers, partners and suppliers who have a genuine business need to see the information will have access to it and use it appropriately; and  Report any information losses.
AutoNDA by SimpleDocs
Security and Assurance. For the purpose of the RTI-UC interface only information deemed necessary to meet the governments business objectives will be exchanged. The system to system data transfer has been accredited thus assuring the HMRC information owner of the security protocols employed to protect the data whilst in transit. The resultant risks will remain with HMRC because the details of the security protocols employed to protect the data whilst in transit have not been shared with DWP. Following receipt of the data, DWP have agreed to; • Only use the data for purposes that are in accordance with the legal basis under which it has been received. • Only hold the data while there is a business need to keep it • Ensure that only people who have a genuine business need to see the data will have access to it • Store data received securely and in accordance with the prevailing central government standards, for example in secure premises and on secure IT systems • Move, process and destroy data securely i.e. in line with HM Government Security Policy Framework and in particular Security Policy 2: Security of Information, issued by the Cabinet Office, when handling, transferring, storing, accessing or destroying information. • Comply with reporting requirements (e.g. reporting data losses or wrongful disclosure), in line with the Cabinet Office Checklist for Managing Potential Loss of Data or Information. Report any data losses, wrongful disclosures or breaches of security relating to information originating in HMRC to the designated contacts immediately (within 24 hours of becoming aware). This includes both advising and consulting with HMRC on the appropriate steps to take, e.g. notification of the Information Commissioner’s Office or dissemination of any information to the data subjects. • Review this MOU with HMRC annually, until such time that the system is deemed to be stable, at which time a 5-yearly review cycle will be implemented. • Allow HMRC Internal Audit to request an audit to help in deciding whether HMRC should continue to provide the data to DWP. • Provide written, signed assurance that they have complied with these undertakings regularly upon request.
Security and Assurance. 10.1 Data security for storage and linkage of the data will be provided with an assured ONS data analysis environment that includes the following elements of security control: • Need To Know applied through user account access and management • Controlled ingest and export of data into/out from the environmentControlled account access using unique credentials based on job role • Logged and monitored access of user activity within the environment • Secure build configuration for infrastructure, including cloud services • Vulnerability tested infrastructure with appropriate remediation and patching • Compliance checks against security enforcing controls • Architectural review against standards and best practice • Staff security cleared to the appropriate level based on their supervised and/or unsupervised access to sensitive data in accordance with ONS clearance policies and data access processes • Education and awareness of environment users covering security policies and secure working practices • Operational support processes to securely manage the environment • Risk assessment to identify security risks and mitigation actions to reduce this risk.
Security and Assurance. 36. The parties agree to:
Security and Assurance. 6. General Data Protection Regulation 2018 (GDPR) and Human Rights Act
Security and Assurance. 7.1 [Describe how the data will be transferred securely between the parties] The information must be stored securely at all times in line with government security standards as outlined at: xxx.xxxx.xxx.xx/xxxxxxxx/00-xxxxx-xxxxx-xxxxxxxx Details for password protected secure transfer in line with above principles: • For file transfers, [Name of Laboratory] will share the data by emailing through an encrypted file containing the data, with the password used to encrypt the file communicated to the intended recipient by either telephone or SMS text message – NOT by email. • Defra must ensure the data is stored in either an encrypted file or in the secure government network at all times and is accessible only to Defra staff authorised to access the data.
Security and Assurance. DWP agrees to: • Only use the information for purposes that are in accordance with the legal basis under which they received it • Only hold the data while there is a business need to keep it • Ensure that only people who have a genuine business need to see the data will have access to it. • Store data received securely and in accordance with the prevailing central government standards, for example in secure premises and on secure IT systems. • Move, process and destroy data securely i.e. in line with the principles set out in HM Government Security Policy Framework, issued by the Cabinet Office, when handling, transferring, storing, accessing or destroying information. • Comply with the requirements in the Security Policy Framework, and in particular Section 2.10, to be prepared for and respond to Security Incidents and to report any data losses, wrongful disclosures or breaches of security relating to information. • Apply the appropriate baseline set of personnel, physical and information security controls that offer an appropriate level of protection against a typical threat profile as set out in Government Security Classifications, issued by the Cabinet Office, and as a minimum the top level controls framework provided in the Annex – Security Controls Framework to the GSC.
AutoNDA by SimpleDocs
Security and Assurance. Home Office
Security and Assurance. The Department for Work & Pensions agrees to:  Only use the information for purposes that are in accordance with the legal basis under which they received it  Become the responsible owner of the HMRC data once the transfer is complete including ensuring the necessary security is in place for any subsequent transfer to NI DfC  Only hold the data while there is a business need to keep it  Ensure that only people who have a genuine business need to see the data will have access to it  Store data received securely and in accordance with the prevailing central government standards, for example in secure premises and on secure IT systems.  Move, process and destroy data securely i.e. in line with the principles set out in HM Government Security Policy Framework, issued by the Cabinet Office, when handling, transferring, storing, accessing or destroying information.  Comply with the requirements in the Security Policy Framework, and in particular Section 2.10, to be prepared for and respond to Security Incidents and to report any data losses, wrongful disclosures or breaches of security relating to information originating in HMRC to the designated contacts immediately (i.e. within 24 hours of becoming aware). This includes both advising and consulting HMRC on the appropriate steps to take e.g. notification of the Information Commissioners Office or dissemination of any information to the data subjects. The contact point within HMRC for DWP to use in the event of any such losses is the B&C Data Guardian (  Apply the appropriate baseline set of personnel, physical and information security controls that offer an appropriate level of protection against a typical threat profile as set out in Government Security Classifications, issued by the Cabinet Office, and as a minimum the top level controls framework provided in the Annex – Security Controls Framework to the GSC.  Allow HMRC Internal Audit to carry out an audit to help in deciding whether HMRC should continue to provide the data, upon request  Provide written, signed assurance that they have complied with these undertakings regularly upon request

Related to Security and Assurance

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • ACKNOWLEDGMENT AND ASSUMPTION OF RISKS The Event takes place indoors or outdoors and may include but is not limited to: warm-up exercises; competitive running and/or walking, both in practice and in the Event; demo-ing (trying out) gear; participation in clinics, training, demonstrations, or other games and activities; attendance at any Event activities; use of any equipment, facilities or premises; and traveling in planes, vans, buses, or other vehicles to and from activities (the Event and other activities collectively referred to in this Agreement as “Activities” or “Activity”). Activities may be scheduled or unscheduled, mandatory or optional, whether or not authorized and/or conducted by Organizer, structured or unstructured, and include free time. I acknowledge that the inherent and other risks, hazards, and dangers (collectively referred to in this Agreement as “Risks”) of the Activities can cause injury, damage, death, or other loss to Participant or others. I give permission for my child to participate in all Activities and shall discuss this Agreement, and specifically, the Activities and inherent risks, with my child. The following describes some, but not all, of the Risks assumed by Participant by participating in the Event or Activities:

  • Assignment and Assumption The parties to each assignment shall execute and deliver to the Administrative Agent an Assignment and Assumption, together with a processing and recordation fee in the amount of $3,500; provided, however, that the Administrative Agent may, in its sole discretion, elect to waive such processing and recordation fee in the case of any assignment. The assignee, if it is not a Lender, shall deliver to the Administrative Agent an Administrative Questionnaire.

  • Amendment and Assignment This Agreement may be amended only in writing and signed by both parties. This Agreement may not be assigned to another party.

  • CESSION AND ASSIGNMENT The Service Provider shall not cede, assign, abandon or transfer any of its rights and/or obligations in terms of this Agreement (whether in part or in whole) or delegate any of its obligations in terms of this Agreement, without the prior written consent of the Fund.

  • Variation and Assignment No variation of this agreement shall be valid or effective unless it is in writing. We may amend this TOBA by sending you either a notice of amendment in writing or a revised TOBA. We are entitled to assign this TOBA to any other Affiliate for so long as such company remains an Affiliate.

  • Indemnification and Assumption of Risk – Vendor Data VENDOR AGREES THAT IT IS VOLUNTARILY PROVIDING DATA (INCLUDING BUT NOT LIMITED TO: VENDOR INFORMATION, VENDOR DOCUMENTATION, VENDOR’S PROPOSALS, VENDOR PRICING SUBMITTED OR PROVIDED TO TIPS, TIPS CONTRACT DOCUMENTS, TIPS CORRESPONDENCE, VENDOR LOGOS AND IMAGES, VENDOR’S CONTACT INFORMATION, VENDOR’S BROCHURES AND COMMERCIAL INFORMATION, VENDOR’S FINANCIAL INFORMATION, VENDOR’S CERTIFICATIONS, AND ANY OTHER VENDOR INFORMATION OR DOCUMENTATION, INCLUDING WITHOUT LIMITATION SOFTWARE AND SOURCE CODE UTILIZED BY VENDOR, SUBMITTED TO TIPS BY VENDOR AND ITS AGENTS) (“VENDOR DATA”) TO TIPS. FOR THE SAKE OF CLARITY, AND WITHOUT LIMITING THE BREADTH OF THE INDEMNITY OBLIGATIONS IN SECTION 14 ABOVE, VENDOR AGREES TO PROTECT, INDEMNIFY, AND HOLD THE TIPS INDEMNITEES HARMLESS FROM AND AGAINST ANY AND ALL LOSSES, CLAIMS, ACTIONS, DEMANDS, ALLEGATIONS, SUITS, JUDGMENTS, COSTS, EXPENSES, FEES, INCLUDING COURT COSTS, ATTORNEY’S FEES, AND EXPERT FEES AND ALL OTHER LIABILITY OF ANY NATURE WHATSOEVER ARISING OUT OF OR RELATING TO: (I) ANY UNAUTHORIZED, NEGLIGENT OR WRONGFUL USE OF, OR CYBER DATA BREACH INCIDENT AND VIRUSES OR OTHER CORRUPTING AGENTS INVOLVING, VENDOR’S DATA, PRICING, AND INFORMATION, COMPUTERS, OR OTHER HARDWARE OR SOFTWARE SYSTEMS, AND; (II) ALLEGATIONS OR CLAIMS THAT ANY VENDOR DATA INFRINGES ON THE INTELLECTUAL PROPERTY RIGHTS OF A THIRD-PARTY OR VENDOR.

  • Transfers and Assignments You cannot assign or transfer any interest in your account unless we agree in writing.

  • Subcontract and Assignment This Agreement binds the heirs, successors, assigns and representatives of the Contractor. The Contractor shall not enter into subcontracts for any work contemplated under this Agreement and shall not assign this Agreement or monies due or to become due, without the prior written consent of the General Manager of the Agency or his designee, subject to any required state or federal approval. (Note: list any subcontractors here)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!