Security Management Services Sample Clauses
Security Management Services. Riskonnect shall provide appropriate and comprehensive security Services, that meet the County’s security requirements identified in Schedule A, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the RCMIS Systems and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the County Data. Without limiting anything set forth in the Scope of Work, such Services shall include operating RCMIS Systems under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Riskonnect, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
Security Management Services. Vendor shall provide and maintain all appropriate administrative, physical, technical and procedure safeguards to secure County Data from data breach, protect County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and Services. Without limiting anything set forth in the Statements of Work, such Services shall include providing a centralized Vendor security organization or group that is responsible for all aspects of such security Services, routinely performing all necessary and appropriate security assessments and evaluations, developing and implementing a best practices-based security plan (subject to the reasonable written approval of the County) that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Vendor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
Security Management Services. OneNeck shall provide the following services, which shall comprise “Security Management Services,” provided, however, that any obligations set forth in this Article 5.7 shall be in addition to and shall in no way limit any other obligations of OneNeck regarding security as may be required by Client.
Security Management Services. Contractor shall provide appropriate and comprehensive security Services, that meet County’s security requirements identified in Attachment D, ITMS Technical Requirements, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the ITMS and County Data, and to protect against unauthorized access to, use of, or intrusion into, the systems and unauthorized disclosure of the County Data. Without limiting anything set forth in the Scope of Work, such services shall include operating ITMS under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances to which County and Contractor are subject relating to security, privacy, or confidentiality, ensuring compliance with County security policies and procedures provided and made available to Contractor in this Contract, performing all necessary and appropriate security- related audits and reports, and, to the extent practically possible and upon request, promptly providing the County with a full and complete copy of each such report.
Security Management Services. Contractor shall provide appropriate and comprehensive security Services, that meet County’s security requirements identified in Attachment E, PIMS Delivery Hosted/Managed, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the PIMS and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of County Data. Without limiting anything set forth in Attachment A, Scope of Work, such Services shall include operating PIMS under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
Security Management Services. Lenel OnGuard certified and serves as the regional administrator for the Enterprise Physical Access Control System (EPACS). SYSTEM FOR ADMINISTRATION, TRAINING, AND EDUCATION RESOURCES FOR NASA (SATERN): The Agency database for providing desktop access to training information and on-line courses to all NASA employees and some NASA/SSC contractors. The SATERN Learning Management System Software is a comprehensive system which has enabled process standardization and timely, up-to-date training information. Centers and Disciplines are able to identify training requirements, deploy learning, and track its completion. SOFTWARE SUSTAINING: Any modifications, enhancement, or bug fixes to a software system, application, website, database, or component after delivery to correct faults, improve performance or other attributes, adapt to a changed environment, or provide ongoing support and maintenance. T TASK MONITOR (TM) A Government official who has been appointed by the Contracting Officer (CO) who has the responsibility in managing the technical aspects of the each specific annex and monitoring the contractor’s technical performance and delivery of the final products and/or services. Pursuant to NFS 1842.270, the TM is not authorized to initiate procurement actions or in any way cause a change to the contract or increase the Government's financial obligations. The TM is the only Government official authorized to direct contractor performance, execute modifications to the contract, and contractually obligate the Government. The TM works in conjunction with the contracts COR. TESTING: The process by which the presence, quality, or performance is determined. TOOL: Equipment, device, or IT system that serves as an aid to accomplishing a task. TRAINING: This definition contains typical functions associated with ensuring the preparation of personnel to perform the functions necessary to provide the services as listed in the performance work statement. TRANSITION (contract): Period of time from contract award date up to contract effective date. U "UPDATE AND MAINTAIN" (as used in the PWS): An existing approach/product that the Contractor is required to review, update, utilize and sustain. V VERIFY: To confirm the accomplishment of an operation, either by witnessing the actual operation or by inspecting the completed operation, depending on the nature of the work being performed. VOLUNTARY PROTECTION PROGRAM (VPP): A federal program administered by OSHA and adopted by NA...
Security Management Services. Contractor shall provide appropriate and comprehensive security Services, that meet County’s security requirements identified in Attachment E, PIMS Delivery Hosted/Managed, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the PIMS and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of County Data. Without limiting anything set forth in Attachment A, Scope of Work, such Services shall include operating PIMS under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report. Anti-Malware Protections: Contractor’s data center shall have strong access controls and secure practices, such as specialized authorization system(s), in effect at all times to prevent unauthorized physical and virtual access to hosted County systems. Contractor servers and network equipment hosted at the data center shall be properly secured from the threat of cyber hackers and viruses through appropriate intrusion detection tools, proactive 24x7x365 monitoring and prompt installation of new software updates, hot fixes and security patches.
Security Management Services. Vendor shall provide appropriate and comprehensive security Services, as further described in Appendix 2 to Schedule 3.3, using industry best practices and methods, commercially available technology, to at all times ensure the security, integrity, and confidentiality of the Systems and Commonwealth Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the Commonwealth Data. Without limiting anything set forth in the Statements of Work, such Services shall include, in accordance with Section 13, providing a centralized Vendor security organization or group that is responsible for all aspects of such security Services, routinely performing all necessary and appropriate security assessments and evaluations, developing and implementing a security plan (subject to the reasonable written approval of the Commonwealth) that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with Commonwealth and VITA security policies and procedures provided or made available to Vendor, performing all necessary and appropriate security-related audits and reports, and promptly providing VITA with a full and complete copy of each such report. Vendor shall also
(A) provide physical security for the new Richmond Enterprise Solution Center and the Southwest Enterprise Solution Center and any other Vendor-owned and leased buildings and facilities, (B) manage physical security, in support of the delivery of the Services, of Locations that are managed by VITA as of the Services Commencement Date, (C) provide IT security-awareness training programs for all Vendor Personnel and, as requested by the Commonwealth, for the Commonwealth personnel, and (D) provide operational support of security processes for the Systems. Specific security-related issues that shall be appropriately addressed by Vendor in providing the Services include, in accordance with Section 13: (i) physical security of the new Richmond Enterprise Solution Center and the Southwest Enterprise Solution Center and any other Vendor-owned and leased buildings and facilities, including security guards, physical barriers to entry, and appropriate hardening of facilities;
Security Management Services. Contractor shall provide appropriate and comprehensive security services that meet County’s security requirements, using industry standards and practices and methods, and commercially available technology, to at all times ensure the security and integrity of the CMMS and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Contractor’s Systems and unauthorized disclosure of County Data not caused by County. Without limiting anything set forth in Attachment A, Scope of Work, such Services shall include operating the CMMS under a security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report. Without limiting any other audit rights of County, County shall have the right to review Contractor’s data privacy and information security program prior to the commencement of Services and from time to time during the term of this Contract but not more frequently than annually. In addition, during the term of this Contract from time to time and with reasonable notice, County, at its own expense, shall be entitled to perform, or to have performed, an on-site audit of Contractor’s data privacy and information security program.
Security Management Services. The Contractor shall provide appropriate and comprehensive security Services, that meet the County’s security requirements as required by this Contract and in Attachment F – Solution Delivery Hosted/Managed, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the Agenda system and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the County Data. Without limiting anything set forth in the Scope of Work, such Services shall include operating Agenda system under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to the Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing the County with a full and complete copy of each such report. Anti-Malware Protections: The Contractor’s data center shall have strong access controls and secure practices, such as specialized authorization system(s), in effect at all times to prevent unauthorized physical and virtual access to hosted County systems. The Contractor servers and network equipment hosted at the data center shall be properly secured from the threat of cyber hackers and viruses through appropriate intrusion detection tools, proactive 24x7x365 monitoring and prompt installation of new software updates, hot fixes and security patches.