Security Guidance Sample Clauses

Security Guidance. It is essential that the participating agencies provide personal or other sensitive information only to specific individuals authorised to receive it. The transfer, use, storage and retention of the information by each participating agency must comply with the Data Protection Act, and should comply with the security requirements stipulated within this agreement. Any additional security requirements that an agency wishes to specify must be done so in agreement with all parties involved within this document.
AutoNDA by SimpleDocs
Security Guidance. The security classification guidance needed for this classified effort is identified below. If any difficulty is encountered in applying this guidance or if any other contributing factor indicates a need for changes in this guidance, the contractor is authorized and encouraged to provide recommended changes; to challenge the guidance or the classification assigned to any information or material furnished or generated under this contract; and to submit any questions for interpretation of this guidance to the official identified below. Pending final decision, the information involved shall be handled and protected at the highest level of classification assigned or recommended. (Fill in as appropriate for the classified effort. Attach, or forward under separate correspondence, any documents/guides/extracts referenced herein. Add additional pages as needed to provide complete guidance.) MATERIAL GENERATED UNDER THIS CONTRACT SHALL PERPTUATE THE CLASSIFICATION/DOWNGRADING/DECLASSIFICATION OF SOURCE MATERIAL. THE HIGHEST CLASSIFICATION FOR THIS CONTRACT IS TOP SECRET. VISIT REQUEST TO ACTIVITIES OTHER THAN COMSPAWARSYSCOM (PMW 176, PMW 173 AND PD 70E SHALL HAVE "NEED-TO-KNOW" CERTIFIED BY COMPAWARSYSCOM (PMW 176). ------------------------------------------------------------------------------------------------------------------------------------ ESTIMATED COMPLETION DATE COGNIZANT COTR//PROGRAM MANAGER, NAME, CODE, TEL. NO. ------------------------------------------------------------------------------------------------------------------------------------ 30 SEPTEMBER 2000 DOUG XXXX XXX 176-41B, (703)000-0000 ------------------------------------------------------------------------------------------------------------------------------------ 14. ADDITIONAL SECURITY REQUIREMENTS. Requirements, in addition to ISM requirements, are established for this contract. [X] YES [ ] NO (If Yes, identify the pertinent contractual clauses in the contract document itself, or provide an appropriate statement which identifies the additional requirements. Provide a copy of the requirements to the cognizant security office. Use Item 13 if additional space is needed.) SEE ATTACHED "TEMPEST SECURITY REQUIREMENTS" [SIG] DATE 3/12/96
Security Guidance. The security classification guidance needed for this effort is identified below. If any difficulty is encountered in applying this guidance or if any other contributing factor indicates a need for changes in this guidance, the contractor is authorized and encouraged to provide recommended changes: to challenge the guidance or classification assigned to any information or material furnished or generated under this contract; and to submit any questions for interpretation of this guidance to the official identified below. Pending final decision, the information involved shall be handled and protected at the highest level of classification assigned or recommended. (Fill in as appropriate for the classified effort. Attach, or forward under separate correspondence, any document/guides/extracts referenced herein. Add additional pages as needed to provide complete guidance.
Security Guidance. The security classification guidance needed for this classified effort is identified below. If any difficulty is encountered in applying this guidance or if any other contributing factor indicates a need for changes in this guidance, the contractor is authorized and encouraged to provide recommended changes; to challenge the guidance or the classification assigned to any information or material furnished or generated under this contract; and to submit any questions for interpretation of this guidance to the official identified below. Pending final decision, the information involved shall be handled and protected at the highest level of classification assigned or recommended. (FILL IN AS APPROPRIATE FOR THE CLASSIFIED EFFORT. ATTACH, OR FORWARD UNDER SEPARATE CORRESPONDENCE, ANY DOCUMENTS/GUIDES/EXTRACTS REFERENCED HEREIN. ADD ADDITIONAL PAGES AS NEEDED TO PROVIDE COMPLETE GUIDANCE.)
Security Guidance. The security classification guidance needed for this classified effort is identified below. If any difficulty is encountered in applying this guidance or if any other contributing factor indicates a need for changes in this guidance, the contractor is authorized and encouraged to provide recommended changes; to challenge the guidance or the classification assigned to any information or material furnished or generated under this contract; and to submit any questions for interpretation of this guidance to the official identified below. Pending final decision, the information involved shall be handled and protected at the highest level of classification assigned or recommended. (Fill in appropriate for the classified effort. Attach, or forward under separate correspondence, any documents/guides/extracts referenced herein. Add additional pages as needed to provide complete guidance) Additional security requirements begin on page 3. Annual Review of This Form Required ______ NO X YES (date) One year ADAD ------ ---------------------------- TYPED NAME, TITLE AND SIGNATURE OF PROGRAM/PROJECT MANAGER/COR OR OTHER DESIGNATED OFFICIAL Xxxx Xxxxxxxxx Program Manager /S/ XXXX XXXXXXXXX ACTIVITY NAME ADDRESS, ZIP CODE, TELEPHONE NUMBER AND OFFICE SYMBOL Director, National Security Agency 0000 Xxxxxx Xxxx, Xxxx: X00 Fort Xxxxxx X. Xxxxx, MD 20755-6733 (000) 000-0000 ONLY AUTHORIZED NSA CONTRACTING OFFICERS MAY SERVE AS CERTIFYING OFFICIALS FOR NSA SCI CONTRACTS AND SUBCONTRACTS. 14.ADDITIONAL SECURITY REQUIREMENTS. Requirements, in addition to ISM requirements, are established for this contract. (If Yes, identify the pertinent contractual clauses in the contract document itself, or provide an appropriate statement which identifies the additional requirements. Item 13 if additional space is needed.) Provide a copy of the requirements to the cognizant security office. Use YES NO X-------------------
Security Guidance. The security classification guidance needed for this classified effort is identified below. If any difficulty is encountered in applying this guidance or if any other contributing factor indicates a need for changes in this guidance, the contractor is authorized and encouraged to provide recommended changes; to challenge the guidance or the classification assigned to any information or material furnished or generated under this contract; and to submit any questions for interpretation of this guidance to the official identified below. Pending final decision, the information involved shall be handled and protected at the highest level of classification assigned or recommended. (Fill in as appropriate for the classified effort. Attach, or forward under separate correspondence, any documents/guides/extracts referenced herein. Add additional pages as needed to provide complete guidance.) 1. Information generated under this contract shall be classified in accordance with OPNAVINST S5513, enclosure (18.1), and OPNAVINST S5513.3B, enclosure (11.2). 2. Document preparation and distribution shall be only as prescribed by the Program Officer. 3. The official in item 16 will certify need-to-know (e.g., for visit request/documents) for contractor. (Program Officer: Office of Naval Research Xxxxx X. Xxxxxxxx/ONR 312 Ballston Centre Tower One 000 Xxxxx Xxxxxx Xxxxxx Arlington, VA 22217-5600 (000) 000-0000; DSN 000-0000
Security Guidance. The security classification guidance need for this classified effort is listed below. If any difficulty is encountered in applying this guidance or if any other contributing factor indicates a need for changes in this guidance, the contractor is authorized and encouraged to provide recommended changes; to challenge the guidance or the classification assigned to any information or material furnished or generated under this contract; and to submit any questions for interpretation of this guidance to the official identified below. Pending final decision, the information involved shall be handled and protected at the highest level of classification assigned or recommended. (Fill in as appropriate for the classified effort. Attach, or forward under separate correspondence, any documents/guidelines/extracts reference herein. Add additional pages as needed to provide complete This contract requires access to Sensitive Compartmented Information (SCI). The Director, National Imagery and Mapping Agency (NIMA) has exclusive responsibility for all collateral and SCI classified information release to or developed under this contract and held within the Contractor's SCI Facility (SCIF). The Department of Defense (DoD) S-5105.21-MI, SCI Security Manual, Administrative Security: DoD TS.5105.21-M-2, COMINT Policy, and the Imagery Policy Series, Section 5, and all regulations, manuals, and directives stated therein provide program security classification guidance for personnel, information, physical, automated information systems (AIS), and technical security measures and are part of the SCI security classification specifications for this contract. Inquiries pertaining to SCI classification guideline determination or interpretation shall be directed to the Contracting Officer's Representative (COR) identified in the DD254. The following security documentation also applies: A. Executive Order 12968, Personnel Security Standards, 4 AUG 95. B. DoD 5220.22-M, National Industrial Security Program (NISPOM) Operating Manula, Jan 95. C. DoD 5220.22-M-Sup I, NISPOM, Operating Manual Supplement, Feb 95 D. Director of Central Intelligence Directive 1/16, 19 Jul 88, Security Policy for Uninform Protection of Intelligence Processes in Automated Information Systems, Jul 88, w/supplements E. AIS Security Implementation Manual, AISSIM-200, 18 FEB 94 (Implementation guidance to the DCID 1/16.
AutoNDA by SimpleDocs
Security Guidance. The security classification guidance needed for this classified effort is identified below. If any difficulty is encountered in applying this guidance or if any other contributing factor indicates a need for changes in this guidance, the contractor is authorized and encouraged to provide recommended changes; to challenge the guidance or the classification assigned to any information or material furnished or generated under this contract; and to submit any questions for interpretation of this guidance to the official identified below. Pending final decision, the information involved shall be handled and protected at the highest level of classification assigned or recommended. (Fill in as appropriate for the classified effort. Attach or forward under separate correspondence any documents/guides/extracts referenced herein. Add additional pages as needed to provide complete guidance.) SECURITY CLASSIFICATION GUIDANCE IS AS FOLLOWS: OPNAVINST S5513.2B-16 (U) CRYPTO INSTALLATIONS OPNAVINST S5513.2B-31.4 (U) HARPOON WEAPON SYSTEM (A/R/UGM-84) OPNAVINST S5513.2B-39.2 (U) LAMPS, MK III OPNAVINST S5513.2B-51 (U) SH-2, LAMPS MK I OPNAVINST S5513.2B-71 (U) TOMAHAWK CRUISE MISSILE (BGM-109) (SLCM, ALCM) OPNAVINST S5513.3B-11 (U) AEGIS, MK-7 OPNAVINST S5513.3B-17 (U) COMBATANT SHIPS (LESS SUBMARINES) OPNAVINST S5513.3B-22 (C) DRAG AND NOISE REDUCTION SHIPBOARD AND/OR TORPEDO OPNAVINST S5513.3B-36 (U) LAUNCHING, SHPBRD CHAFF DECOY SYS/PROG (CHAFFROC) OPNAVINST S5513.3B-37 (U) MK41 VERTICAL LAUNCH SYSTEMS (VLS) OPNAVINST S5513.3B-53 (U) PROTECTION TECHNOLOGY, SHIP PASSIVE OPNAVINST S5513.3B-57 (U) SILENCING DATA, SHIP OPNAVINST S5513.3B-62 (U) STANDARD MISSILE 1 (SM-1) DTD 21 APR 94 OPNAVINST S5513.3B-63 (U) STANDARD MISSILE 2 (SM-2) DTD 22 JUN 93 OPNAVINST S5513.3B-74 (U) VIBRATION DATA, SHIP OPNAVINST S5513.3B-83 (U) GUN FIRE CONTROL SYSTEM MK-86 OPNAVINST S5513.3B-86 (U) VERTICAL LAUNCH ASROC (VLA) OPNAVINST S5513.3C-12 (U) CLOSE IN WEAPON SYSTEM (CIWS) (PHALANX) OPNAVINST S5513.3C-52 (C) PROPULSORS, SURFACE SHIP OPNAVINST S5513.3C-82 (U) AN/SQS-26, AN/SQS-53, AN/SQS-53, AN/ARR-75, ETC. OPNAVINST S5513.3C-84 (S) AN/SLQ-25, NIXIE OPNAVINST S5513.3C-88 (U) AN/SQQ-89 (V) OPNAVINST S5513.3C-91 (U) LOW OBSERVABLE OPNAVINST S5513.3C-96 (C) LOW OBSERVABLE (FORMERLY LIMIT DRAGON) OPNAVINST S5513.6C-12 (U) HIGH FREQUENCY COMMUNICATION IMPROVEMENT & MOD OPNAVINST S5513.6C-21 (U) SATELLITE COMMUNICATIONS, FLEET OPNAVINST S5513.6C-39 (U) TSEC/KG-84C OPNAVINST S5513.8B-03 (U) ECM/E...
Security Guidance. The security classification guidance needed for this classified effort is identified below. If any difficulty is encountered in applying this guidance or if any other contributing factor indicates a need for changes in this guidance, the contractor is authorized and encouraged to provide recommended changes: to challenge the guidance or the classification assigned to any information or material furnished or generated under this contract: and to submit any questions for interpretation of this guidance to the official identified below. Pending final decision, the information involved shall be handling and protected at the highest level of classification assigned or recommended. (Fill in as appropriate for the classified effort. After or forward under separate correspondence, any documents/guides/extracts referenced herein. Add additional pages as needed to provide complete guidance.) The Contractor will participate in classified mission briefings and debriefings related to U.S. Navy and NATO forces. The Contractor will be responsible for the proper handling and safeguarding of subject materials in accordance with DOD Directive 5220.22-M. The Contractor will receive and generate classified material for flight operations. Some material/reports generated under this contract are UNCLASSIFIED unless they contain data extracted from classified references, in which case the material/report will be classified according to the source data/references. All classified documents generated will be marked in accordance with paragraph 11 of DOD 5220.22-M (current evaluations and changes thereto). Upon submission of the final end product on this contract all classified material accountable to this contract will be destroyed in accordance with paragraph 19 of DOD 5220.22-M; returned to the sender if so directed, unless retention is requested and granted in accordance with paragraph 5.m of DOD 5220.22-M; or is authorized for transfer to a follow-on contractor. The Contractor will be responsible for the proper handling and storage of subject generated received material in accordance with Section II of DOD 5220.22M. Storage of classified documents/material, etc., will be only at the actual place of performance specified in paragraph 8a. Information on this contract is not releasable to foreign nationals or personnel with "reciprocal" clearances without the written approval of NAVAIRSYSCOM (AIR-5116C). FOUO information generated and/or provided under this contract shall be safegu...

Related to Security Guidance

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Agreement to Use Electronic Signatures I agree, and it is my intent, to sign this Contract by accessing State of Indiana Supplier Portal using the secure password assigned to me and by electronically submitting this Contract to the State of Indiana. I understand that my signing and submitting this Contract in this fashion is the legal equivalent of having placed my handwritten signature on the submitted Contract and this affirmation. I understand and agree that by electronically signing and submitting this Contract in this fashion I am affirming to the truth of the information contained therein. I understand that this Contract will not become binding on the State until it has been approved by the Department of Administration, the State Budget Agency, and the Office of the Attorney General, which approvals will be posted on the Active Contracts Database: xxxxx://xx00.xxxx.xx.xxx/psp/pa91prd/EMPLOYEE/EMPL/h/?tab=PAPP_GUEST

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Cybersecurity Training A. Contractor represents and warrants that it will comply with the requirements of Section 2054.5192 of the Texas Government Code relating to cybersecurity training and required verification of completion of the training program. B. Contractor represents and warrants that if Contractor or Subcontractors, officers, or employees of Contractor have access to any state computer system or database, the Contractor, Subcontractors, officers, and employees of Contractor shall complete cybersecurity training pursuant to and in accordance with Government Code, Section 2054.5192.

  • Uniform Commercial Code Security Agreement (a) This Instrument is also a security agreement under the Uniform Commercial Code for any of the Mortgaged Property which, under applicable law, may be subjected to a security interest under the Uniform Commercial Code, whether such Mortgaged Property is owned now or acquired in the future, and all products and cash and non-cash proceeds thereof (collectively, "UCC Collateral"), and Borrower hereby grants to Lender a security interest in the UCC Collateral. Borrower hereby authorizes Lender to prepare and file financing statements, continuation statements and financing statement amendments in such form as Lender may require to perfect or continue the perfection of this security interest and Borrower agrees, if Lender so requests, to execute and deliver to Lender such financing statements, continuation statements and amendments. Borrower shall pay all filing costs and all costs and expenses of any record searches for financing statements and/or amendments that Lender may require. Without the prior written consent of Lender, Borrower shall not create or permit to exist any other lien or security interest in any of the UCC Collateral. (b) Unless Borrower gives Notice to Lender within 30 days after the occurrence of any of the following, and executes and delivers to Lender modifications or supplements of this Instrument (and any financing statement which may be filed in connection with this Instrument) as Lender may require, Borrower shall not (i) change its name, identity, structure or jurisdiction of organization; (ii) change the location of its place of business (or chief executive office if more than one place of business); or (iii) add to or change any location at which any of the Mortgaged Property is stored, held or located. (c) If an Event of Default has occurred and is continuing, Lender shall have the remedies of a secured party under the Uniform Commercial Code, in addition to all remedies provided by this Instrument or existing under applicable law. In exercising any remedies, Lender may exercise its remedies against the UCC Collateral separately or together, and in any order, without in any way affecting the availability of Lender's other remedies. (d) This Instrument constitutes a financing statement with respect to any part of the Mortgaged Property that is or may become a Fixture, if permitted by applicable law.

  • Electronic Signatures A signed copy of this Amendment or any other ancillary agreement transmitted by facsimile, email, or other means of electronic transmission shall be deemed to have the same legal effect as delivery of an original executed copy of this Amendment or such other ancillary agreement for all purposes.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!