Security Management Services Sample Clauses

Security Management Services. Riskonnect shall provide appropriate and comprehensive security Services, that meet the County’s security requirements identified in Schedule A, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the RCMIS Systems and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the County Data. Without limiting anything set forth in the Scope of Work, such Services shall include operating RCMIS Systems under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Riskonnect, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
AutoNDA by SimpleDocs
Security Management Services. OneNeck shall provide the following services, which shall comprise “Security Management Services,” provided, however, that any obligations set forth in this Article 5.7 shall be in addition to and shall in no way limit any other obligations of OneNeck regarding security as may be required by Client.
Security Management Services. Contractor shallprovide appropriate and comprehensive security Services, that meet County’s security requirements identified in Attachment D, ITMS Technical Requirements, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the ITMS and County Data, and to protect against unauthorized access to, use of, or intrusion into, the systems and unauthorized disclosure of the County Data. Without limiting anything set forth in the Scope of Work, such services shall include operating ITMS under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances to which County and Contractor are subject relating to security, privacy, or confidentiality, ensuring compliance with County security policies and procedures provided and made available to Contractor in this Contract, performing all necessary and appropriate security-related audits and reports, and, to the extent practically possible and upon request, promptly providing the County with a full and complete copy of each such report.
Security Management Services. Contractor shall provide appropriate and comprehensive security Services, that meet the County’s security requirements identified in Schedule A, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the eGovernment Systems and County Confidential Information, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the County Confidential Information. Without limiting anything set forth in the Scope of Work, such Services shall include operating eGovernment Systems under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County Security Policies and Principles and procedures provided or made available to Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
Security Management Services. The Contractor shall provide appropriate and comprehensive security Services, that meet the County’s security requirements as required by this Contract and in Attachment FSolution Delivery Hosted/Managed, using industry best practices and methods, and commercially available technology, to at all times ensure the security and integrity of the Agenda system and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Systems and unauthorized disclosure of the County Data. Without limiting anything set forth in the Scope of Work, such Services shall include operating Agenda system under a best practices-based security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to the Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing the County with a full and complete copy of each such report. Anti-Malware Protections: The Contractor’s data center shall have strong access controls and secure practices, such as specialized authorization system(s), in effect at all times to prevent unauthorized physical and virtual access to hosted County systems. The Contractor servers and network equipment hosted at the data center shall be properly secured from the threat of cyber hackers and viruses through appropriate intrusion detection tools, proactive 24x7x365 monitoring and prompt installation of new software updates, hot fixes and security patches. The Contractor shall use industry best practices regularly to identify, screen, and prevent any Disabling Device in resources utilized by the Contractor in connection with the provision or receipt of the Services and shall not itself knowingly or intentionally install (and shall prevent its subcontractors from knowingly and intentionally installing) any Disabling Device in resources utilized by the Contractor, the County, or any subcontractor, in connection with the provision or receipt of the Services. A “Disabling Device” is a computer virus, timer, clock, counter, time lock, time bomb, or other limiting design, instruction, or routine that would purposely and inappropriately erase data or programming or cause any resource to become inoperable or otherwise incapable of being used in the full manner for...
Security Management Services. Vendor shall provide and maintain all appropriate administrative, physical, technical and procedure safeguards to secure County Data from data breach, protect County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and Services. Without limiting anything set forth in the Statements of Work, such Services shall include providing a centralized Vendor security organization or group that is responsible for all aspects of such security Services, routinely performing all necessary and appropriate security assessments and evaluations, developing and implementing a best practices-based security plan (subject to County of Orange Master Services Agreement for IT Services – Revision 5 Science Application International Corporation Amendment No. 23 to MA-017-13011864 19 the reasonable written approval of the County) that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Vendor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
Security Management Services. Contractor shall provide appropriate and comprehensive security services that meet County’s security requirements, using industry standards and practices and methods, and commercially available technology, to at all times ensure the security and integrity of the CMMS and County Data, and to protect against unauthorized access to, use of, or intrusion into, the Contractor’s Systems and unauthorized disclosure of County Data not caused by County. Without limiting anything set forth in Attachment A, Scope of Work, such Services shall include operating the CMMS under a security plan that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Contractor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report. Without limiting any other audit rights of County, County shall have the right to review Contractor’s data privacy and information security program prior to the commencement of Services and from time to time during the term of this Contract but not more frequently than annually. In addition, during the term of this Contract from time to time and with reasonable notice, County, at its own expense, shall be entitled to perform, or to have performed, an on-site audit of Contractor’s data privacy and information security program.
AutoNDA by SimpleDocs
Security Management Services. Lenel OnGuard certified and serves as the regional administrator for the Enterprise Physical Access Control System (EPACS). SYSTEM FOR ADMINISTRATION, TRAINING, AND EDUCATION RESOURCES FOR NASA (SATERN): The Agency database for providing desktop access to training information and on-line courses to all NASA employees and some NASA/SSC contractors. The SATERN Learning Management System Software is a comprehensive system which has enabled process standardization and timely, up-to-date training information. Centers and Disciplines are able to identify training requirements, deploy learning, and track its completion. SOFTWARE SUSTAINING: Any modifications, enhancement, or bug fixes to a software system, application, website, database, or component after delivery to correct faults, improve performance or other attributes, adapt to a changed environment, or provide ongoing support and maintenance. T TASK MONITOR (TM) A Government official who has been appointed by the Contracting Officer (CO) who has the responsibility in managing the technical aspects of the each specific annex and monitoring the contractor’s technical performance and delivery of the final products and/or services. Pursuant to NFS 1842.270, the TM is not authorized to initiate procurement actions or in any way cause a change to the contract or increase the Government's financial obligations. The TM is the only Government official authorized to direct contractor performance, execute modifications to the contract, and contractually obligate the Government. The TM works in conjunction with the contracts COR. TESTING: The process by which the presence, quality, or performance is determined. TOOL: Equipment, device, or IT system that serves as an aid to accomplishing a task. TRAINING: This definition contains typical functions associated with ensuring the preparation of personnel to perform the functions necessary to provide the services as listed in the performance work statement. TRANSITION (contract): Period of time from contract award date up to contract effective date. U "UPDATE AND MAINTAIN" (as used in the PWS): An existing approach/product that the Contractor is required to review, update, utilize and sustain. V VERIFY: To confirm the accomplishment of an operation, either by witnessing the actual operation or by inspecting the completed operation, depending on the nature of the work being performed. VOLUNTARY PROTECTION PROGRAM (VPP): A federal program administered by OSHA and adopted by NA...
Security Management Services. Provider shall provide appropriate and comprehensive security Services, as further described in the applicable appendices to the Statements of Work (Schedule 2), using industry best practices and methods, commercially available technology, to at all times ensure the security, integrity, and confidentiality of the Systems and Client Data.
Security Management Services. Vendor shall provide and maintain all appropriate administrative, physical, technical and procedure safeguards to secure County Data from data breach, protect County Data and the Services from loss, corruption, unauthorized disclosure, and from hacks, and the introduction of viruses, Disabling Devices, malware, and other forms of malicious and inadvertent acts that can disrupt County’s access and use of County Data and Services. Without limiting anything set forth in the Statements of Work, such Services shall include providing a centralized Vendor security organization or group that is responsible for all aspects of such security Services, routinely performing all necessary and appropriate security assessments and evaluations, developing and implementing a best practices-based security plan (subject to the reasonable written approval of the County) that conforms in all respects to the requirements of all applicable federal, state and local laws, regulations, and ordinances relating to security, privacy, or confidentiality, ensuring compliance with County and County security policies and procedures provided or made available to Vendor, performing all necessary and appropriate security-related audits and reports, and promptly providing County with a full and complete copy of each such report.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!