SECURITY REQUIREMENTS AND PROTECTION OF DATA Sample Clauses

SECURITY REQUIREMENTS AND PROTECTION OF DATA. The Supplier shall, within five (5) Working Days of the Commencement Date, develop and thereafter maintain a Security Management Plan, which shall be submitted to the Customer for Approval, in accordance with this Clause 20 to apply during the Contract Period. The Supplier shall develop, implement, operate, maintain and continuously improve and maintain an ISMS which will be submitted for Approval by the Customer, tested in accordance with the Methodology, periodically updated and audited in accordance with ISO/IEC 27001. Both the ISMS and the Security Management Plan shall, unless otherwise specified by the Customer, aim to protect all aspects of the Services and all processes associated with the delivery of the Services and shall comply with the Security Policy. The Supplier shall comply, and shall procure the compliance of the Supplier Staff, with the Security Policy and the Security Management Plan (if any) and the Supplier shall ensure (and the Customer shall be entitled to audit) that the Security Management Plan produced by the Supplier fully complies with the Security Policy. Customer Data shall be dealt with in the following way: The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call-Off Agreement or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer from time to time in writing. To the extent that Customer Data is held and/or processed by the Supplier, the Supplier shall take responsibility for preserving the integrity of the Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the security requirements set out by the Customer under this Call-Off Agreement. The Supplier shall ensure that any system on which the Supplier holds any Customer Data which is protectively marked shall be accredited using such accreditation policy or system as specified by the Customer (such as the HMG Security Policy Framework and Information Assurance Policy, taking into account g...
AutoNDA by SimpleDocs
SECURITY REQUIREMENTS AND PROTECTION OF DATA. 20.1 The Supplier shall, within five (5) Working Days of the Commencement Date, develop and thereafter maintain a Security Management Plan, which shall be submitted to the Customer for Approval, in accordance with this Clause 20 to apply during the Contract Period.

Related to SECURITY REQUIREMENTS AND PROTECTION OF DATA

  • SAFETY AND PROTECTION OF PROPERTY The Contractor shall at all times:

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described:

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Use and Protection of Information Recipient agrees to protect such Information of the Discloser provided to Recipient from whatever source from distribution, disclosure or dissemination to anyone except employees of Recipient with a need to know such Information solely in conjunction with Recipient’s analysis of the Information and for no other purpose except as authorized herein or as otherwise authorized in writing by the Discloser. Recipient will not make any copies of the Information inspected by it.

  • Compliance with Data Privacy and Security Laws and Standards Contractor shall comply with all applicable State and federal data privacy and data security laws, rules, and regulations.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Freedom of Information and Protection of Privacy Act ‌ The Supplier acknowledges that the City is subject to the Freedom of Information and Protection of Privacy Act (British Columbia), which imposes significant obligations on the City’s contractors to protect all personal information acquired from the City in the course of providing any service to the City.

  • Freedom of Information and Protection of Privacy b. The Chair and the Minister acknowledge that the Agency is bound to follow the requirements set out in FIPPA in relation to the collection, retention, security, use, distribution and disposal of records.

  • Security of Data a. Each of the parties shall:

Time is Money Join Law Insider Premium to draft better contracts faster.