Security and Data Protection Requirements Sample Clauses

Security and Data Protection Requirements. 12.1 Cisco and its affiliates, representatives, agents, employees, and subcontractors shall only access Your and Your Approved Source’s and the Authorized Third PartiesCustomer Content, networks, and systems when such access is necessary to provide or otherwise deliver Cisco Technology and services contemplated herein. 12.2 Cisco shall implement appropriate administrative, physical, and technical safeguards to protect Customer Content that are consistent with accepted industry practices. Cisco shall ensure that all such safeguards, including the manner in which information or data is collected, accessed, used, stored, processed, disposed of, and disclosed, comply with data protection and privacy laws applicable to Cisco in performing its obligations under this XXXX. Cisco shall not access or attain any personally identifiable information, protected classes of information, or other sensitive information while providing the services contemplated herein, except as contemplated in the applicable offer description and data privacy sheets and in compliance with applicable laws, rules, and regulations, and Xxxxx agrees that any such information shall be protected in the same manner as is Confidential Information. 12.3 Cisco shall have a documented security incident policy and plan and must provide a copy at Your Approved Source’s reasonable request. 12.4 Where Cisco has undertaken independent third-party audit Statement on Standards for Attestation Engagements (“SSAE-18”) certifications for particular Cisco Technology, upon request by Your Approved Source, Cisco will provide annual copies of its applicable System Operation Controls 2 (“SOC2”) report(s) and/or bridge/gap letter(s). 12.5 Cisco will notify the State of Illinois Chief Information Security Officer at XxXX.XXX@xxxxxxxx.xxx within forty- eight (48) hours, or sooner as required by applicable, laws, rules, and regulations, of confirmation of any information breach or other security incident that impacts State of Illinois Customer Content. Cisco will use diligent efforts to remedy any such breach or incident in a timely manner to prevent a reoccurrence. Cisco will reimburse You (or Your Approved Source, if applicable) the costs of mitigating damages and of providing legally required notifications to affected individuals.
AutoNDA by SimpleDocs
Security and Data Protection Requirements. The Cal OES must ensure agreements with state and non-state entities include provisions which protect and minimize risk to the state when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with the EXHIBIT D: CLOUD COMPUTING SERVICES SOFTWARE AS A SERVICE (SAAS) SPECIAL PROVISIONS - TELECOMMUNICATIONS (Rev. 05/03/2021) requirements. The host Cloud provider must provide FedRAMP High Certification, plus, meet the additional requirements found in XXX and CA Statewide Information Management Manual (SIMM).‌
Security and Data Protection Requirements. The CDT must ensure agreements with state and non-state entities include provisions, which protect and minimize risk to the state when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with Exhibit E, Security and Data Protection. CONTRACTOR NAME: DEPARTMENT OF TECHNOLOGY CONTRACT NUMBER: ACCEPTANCE DOCUMENT (AD) NUMBER: TITLE: COMPLETION DATE: TOTAL COST: $ AUTHORIZED AND APPROVED: CONTRACTOR OFFICIAL SIGNATURE / DATE DEPARTMENT OF TECHNOLOGY CONTRACT ADMINISTRATOR SIGNATURE / DATE The task/deliverable(s) will be performed in accordance with this Work Authorization and the provision of Contract Number: of PAGE(S) WORK AUTHORIZATION NUMBER TITLE OF TASK/DELIVERABLE TASK/DELIVERABLE SUMMARY (Brief description of task/deliverable to be performed under work authorization) START DATE COMPLETION DATE TOTAL ESTIMATED LABOR HOURS TOTAL ESTIMATED COST CONTRACTOR CONTRACT ADMINISTRATOR NAME TITLE SIGNATURE DATE DEPARTMENT OF TECHNOLOGY CONTRACT ADMINISTRATOR NAME TITLE SIGNATURE DATE a. Each WA shall consist of a detailed statement of the purpose, objective, or goals to be undertaken by the Contractor and all information requested to be provided per WAform, Exhibit A-2. b. All WA must be in writing prior to beginning work and signed by the Contractor and the CDT Technical Contract Manager. c. The CDT has the right to require the Contractor to stop or suspend work on any WA. d. Personnel resources will not be expended (at a cost to the CDT) on task/deliverable accomplishment in excess of estimated work hours required unless the procedure below is followed: (1) If, in performance of the work, the Contractor determines that a WA to be performed under this Contract cannot be accomplished within the estimated work hours, the Contractor will immediately notify the CDT in writing of the Contractor’s estimate of the work hours which will be required to complete the WA in full. Upon receipt of such notification, the CDT may: (a) Authorize the Contractor to expend the estimated additional work hours or service in excess of the original estimate necessary to accomplish the WA; (b) Terminate the WA; or (c) Alter the scope of the WA in order to define tasks that can be accomplished within the remaining estimated work hours. (2) The CDT will notify the Contractor in writing of its decision within seven (7) calendar days aft...
Security and Data Protection Requirements. The State must ensure Agreements with State and non-state entities include provisions which protect and minimize risk to the State when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with Exhibit D, Security and Data Protection.
Security and Data Protection Requirements. SCO must ensure agreements with State and non-state entities include provisions which protect and minimize risk to the State when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In order to comply with the State Administrative Manual (XXX) Section 5305.8, Contractor must comply with Exhibit E: Special Terms and Conditions.
Security and Data Protection Requirements. The EDD must ensure agreements with state and non-state entities include provisions, which protect and minimize risk to the state when engaging in the development, use, or maintenance of information systems, products, solutions, or services. In accordance with the State Administrative Manual (XXX) Section 5305.8, Exhibit E, Security and Data Protection, California Government Code Section 1044 and Internal Revenue Service Publication 1075, Section 5.1.1, contracted employees who have access to federal tax information (FTI) are required to comply with security requirements as specified under federal and state law. All currently existing and new contracted employees with access to FTI, will be required to complete and successfully pass a background check. Access to FTI would include, but not be limited to the following access modes: • ACES • SCDB • TOP • IRS TIN verification website • Remote access to computers with FTI • Server data files with FTI • Audit documents with FTI data • Form 1099Official Personnel Files that include adverse actions with FTI data • Access to Central Office buildings • Access to areas with FT EDD Contract No. M62980-7100 Am. 1 EDD/Maximus US Services, Inc.

Related to Security and Data Protection Requirements

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto. 8.2 The Receiving Party warrants that it and its Agents have the appropriate technical and organisational measures in place against unauthorised or unlawful processing of data relating to the Bid and against accidental loss or destruction of, or damage to such data held or processed by them.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!