Security Continuous Monitoring (XX Sample Clauses

Security Continuous Monitoring (XX. XX): The information system and assets are monitored to identify cybersecurity events and verify the effectiveness of protective measures.
AutoNDA by SimpleDocs
Security Continuous Monitoring (XX. XX): The information system and assets are monitored to identify cybersecurity events and verify the effectiveness of protective measures. On an annual basis, or when a significant change occurs in the environment, management assesses the current risk landscape based on all facets of the business. Management considers threats, vulnerabilities, weaknesses, and environmental impacts to Securly to assist in the creation of objectives and goals and the allocation of resources. Detection Processes (DE.DP): Detection processes and procedures are maintained and tested to ensure awareness of anomalous events. Securly has implemented measures to detect security vulnerabilities in the environment using external tools and authoritative sources. Prioritized components of the environment are scanned periodically to identify vulnerabilities that present a threat to critical information assets. At least annually, management engages an independent assessor to examine the effectiveness of controls in the environment and understand Securly’s state of compliance with internal policies and/or external frameworks. RESPOND (RS) Response Planning (RS.RP): Response processes and procedures are executed and maintained, to ensure response to detected cybersecurity incidents. To ensure continued business operations during and following any critical incidents that results in a disruption to normal operational capabilities, management has developed a plan to address scenarios that may arise from the occurrence of such disruptive events and incidents. The results of the annual test of incident response and disaster recovery policies and procedures are reported to stakeholders and analyzed to make improvements to the existing plan. Communications (XX.XX): Response activities are coordinated with internal and external stakeholders (e.g. external support from law enforcement agencies). Securly has implemented an entity wide security awareness program to identify weaknesses and vulnerabilities so that security incidents and breaches may be prevented, and detected when they occur. Notice of a security incident must be given to affected internal and external parties as required. Such disclosures, along with the time, date and method of disclosure, is documented in the ticket. Exhibit K-1 Function Category Contractor Response Analysis (RS.AN): Analysis is conducted to ensure effective response and support recovery activities. Incidents that have been identified and entered into the tracking s...
Security Continuous Monitoring (XX. XX): The information system and assets are monitored to identify cybersecurity events and verify the effectiveness of protective measures. Detection Processes (DE.DP): Detection processes and procedures are maintained and tested to ensure awareness of anomalous events. RESPOND (RS) Response Planning (RS.RP): Response processes and procedures are executed and maintained, to ensure response to detected cybersecurity incidents. Communications (XX.XX): Response activities are coordinated with internal and external stakeholders (e.g. external support from law enforcement agencies). Analysis (RS.AN): Analysis is conducted to ensure effective response and support recovery activities. Mitigation (RS.MI): Activities are performed to prevent expansion of an event, mitigate its effects, and resolve the incident. Improvements (XX.XX): Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities. RECOVER (RC) Recovery Planning (RC.RP): Recovery processes and procedures are executed and maintained to ensure restoration of systems or assets affected by cybersecurity incidents. Improvements (XX.XX): Recovery planning and processes are improved by incorporating lessons learned into future activities. Communications (XX.XX): Restoration activities are coordinated with internal and external parties (e.g. coordinating centers, Internet Service Providers, owners of attacking systems, victims, other CSIRTs, and vendors).
Security Continuous Monitoring (XX. XX): The information system and assets are monitored to identify cybersecurity events and verify the effectiveness of protective measures. Detection Processes (DE.DP): Detection processes and procedures are maintained and tested to ensure awareness of anomalous events. RESPOND (RS) Response Planning (RS.RP): Response processes and procedures are executed and maintained, to ensure response to detected cybersecurity incidents. Communications (XX.XX): Response activities are coordinated with internal and external stakeholders (e.g. external support from law enforcement agencies). Analysis (RS.AN): Analysis is conducted to ensure effective response and support recovery activities. Mitigation (RS.MI): Activities are performed to prevent expansion of an event, mitigate its effects, and resolve the incident. Improvements (XX.XX): Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities.
Security Continuous Monitoring (XX. XX): The information system and assets are monitored to identify cybersecurity events and verify the effectiveness of protective measures. 5. As above. Detection Processes (DE.DP): Detection processes and procedures are maintained and tested to ensure awareness of anomalous events. 5. As above. RESPOND (RS) Response Planning (RS.RP): Response processes and procedures are executed and maintained, to ensure response to detected cybersecurity incidents. 5. Communications (XX.XX): Response activities are coordinated with internal and external stakeholders (e.g. external support from law enforcement agencies). 5 Analysis (RS.AN): Analysis is conducted to ensure effective response and support recovery activities. 5 Mitigation (RS.MI): Activities are performed to prevent expansion of an event, mitigate its effects, and resolve the incident. 5 Improvements (XX.XX): Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities. N/A – no previous detection RECOVER (RC) Recovery Planning (RC.RP): Recovery processes and procedures are executed and maintained to ensure restoration of systems or assets affected by cybersecurity incidents. 5. ClickView’s Security Incident Management Policy outlines reporting information security events and weaknesses, incident logging, classification standard, investigation and analysis, impact matric, urgency matrix, priority matrix, resolution and recovery, incident closure, contacting law enforcement, cyber crime investigation, learning from information security incidents and collection of evidence.

Related to Security Continuous Monitoring (XX

  • Availability Control Personal Data will be protected against accidental or unauthorized destruction or loss. Measures: • SAP employs regular backup processes to provide restoration of business-critical systems as and when necessary. • SAP uses uninterrupted power supplies (for example: UPS, batteries, generators, etc.) to protect power availability to the Data Centers. • SAP has defined business contingency plans for business-critical processes and may offer disaster recovery strategies for business critical Services as further set out in the Documentation or incorporated into the Order Form for the relevant Cloud Service. • Emergency processes and systems are regularly tested.

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • SENIORITY (Continued) Seniority shall continue to accumulate and shall not be lost when an employee is on leave due to an injury or accident which is compensable under the Employer's workers' compensation insurance for a period of up to twelve (12) months; when an employee is on leave to serve in the armed forces of the United States; or when an employee is on any paid leave of absence.

  • Mobile Banking Service Mobile Banking is offered as a convenience and supplemental service to our Online Banking services. It is not intended to replace access to Online Banking from your personal computer or other methods you use for managing your accounts and services with us. Mobile Banking allows you to access your Patriot account information, use bill pay, transfer funds between your accounts, deposit items remotely and conduct other banking transactions. We reserve the right to limit the types and number of accounts eligible and the right to refuse to make any transaction you request through Mobile Banking. We may also reserve the right to modify the scope of the Mobile Banking Service at any time. Mobile Banking may not be accessible over some network carriers. In addition, the Mobile Banking Service may not be supportable for all Devices. Patriot cannot guarantee, and is not responsible for, the availability of data services provided by your mobile carrier, such as (but not limited to) data outages or "out of range" issues. You agree to accept responsibility for learning how to use Mobile Banking in accordance with the instructions and agree that you will contact us directly if you have any problems with Mobile Banking. We may modify the Mobile Banking Service from time to time at our sole discretion. You are responsible for making sure you understand how to use Mobile Banking as modified. You also accept responsibility for making sure that you know how to properly use your Device and we will not be liable to you for any losses caused by your failure to properly use the Mobile Banking Service or your Device. You agree that, when you use Mobile Banking, you remain subject to the terms and conditions of your existing agreements with any unaffiliated service providers, including, but not limited to, your mobile service provider and that this Agreement does not amend or supersede any of those agreements. You understand that those agreements may include fees, limitations and restrictions which might impact your use of Mobile Banking (such as data usage or text messaging charges imposed on you by your mobile service provider for uses of or interaction with Mobile Banking), you agree to be solely responsible for all such fees, limitations, and restrictions. You agree that only your mobile service provider is responsible for its products and services. Accordingly, you agree to resolve any problems with your provider directly without involving us. Any deposit account, loan or other credit union product accessed through this Mobile Banking service is also subject to the Account Agreements and Disclosures provided at time of account opening. You should review the Account disclosures carefully, as they may include transaction limitations and fees which might apply to your use of Mobile Banking.

Time is Money Join Law Insider Premium to draft better contracts faster.