Security strategy Sample Clauses

Security strategy the IS function drives data importer’s security direction. The IS function works to ensure compliance with security related policies, standards and regulations, and to raise awareness and provide education to users. The IS function also carries out risk assessments and risk management activities, and manages contract security requirements.
AutoNDA by SimpleDocs
Security strategy the IS function drives Arista’s security direction. The IS function works to ensure compliance with security related policies, standards and regulations, and to raise awareness and provide education to users. The IS function also carries out risk assessments and risk management activities, and manages contract security requirements.
Security strategy the IS function drives Expel’s security direction. The IS function works to ensure compliance with security related policies, standards and regulations, and to raise awareness and provide education to users. The IS function also carries out risk assessments and risk management activities, and manages contract security requirements.
Security strategy drives Provider’s security direction and works to ensure compliance with security-related policies, standards, and regulations, and to raise awareness, and provide education to users. This IS function also carries out risk assessments and risk management activities and manages contract security requirements.
Security strategy. In every site, a stateful firewall working in transparent mode shall be installed inspecting all ingress and egress traffic, so, IP/MPLS equipment with firewall capabilities will be positively valued. • The availability of the interface type as well as modularity (# ports/card) and system capacity of each interface should be provided • All cards in the chassis should be hot-swappable • LAG with 10 Gbps interfaces. • BFD and 802.3ah. • IGP OSPF. • MP-BGP. • MPLS Fastreroute. • QoS with 8 FC. • VPLS: 20 instances. • Routed VPLS. • VPRN: 20 instances. • VPRN routes per instance: 2,000 routes. It shall support a minimum density per device of: • 4 x 10GbE (optical) • 48 x 1GbE • 24 x 10GbE (colocation sites and offices) *MX104 has 12 x 10gbe ports* • 4x 10GbE (transmission and distribution substations) Both kind of equipment shall • Use -48 VDC for power • Be 19’’ rack compatible • Allow Front access • Be able to operate under the following environmental conditions: o 0ºC to +65ºC sustained operation o -40ºC to +70ºC shipping and storage o 5% to 95% humidity (non-condensing)

Related to Security strategy

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Account Management 15.1 The Contractor is required to provide a dedicated Strategic Account Manager who will be the main point of contact for the Authority. The Strategic Account Manager will:  Attend quarterly, or as otherwise agreed, review meetings with the Authority, in person at the Authority’s premises or other locations as determined by the Authority  Attend regular catch-up meetings with the Authority, in person or by telephone/videoconference  Resolve any on-going operational issues which have not been resolved by the Contractor or Account Manager(s) and therefore require escalation  Ensure that the costs involved in delivering the Framework are as low as possible, whilst always meeting the required standards of service and quality.

  • Strategic Planning Facilitate the effective alignment of IT requirements/ Information Resource Management (IRM) plans with strategic business plans and program initiatives. Management Improvements: Development and implementation of improved systems and business practices to optimize productivity and service delivery operations (e.g., analysis, and implementation of improvements in the flow of IT work and program processes and tool utilization, including business system analysis, identification of requirements for streamlining, re-engineering, or re-structuring internal systems/business processes for improvement, determination of IT solution alternatives, benchmarking).

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Research and Development (i) Advice and assistance in relation to research and development of Party B;

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Business Development Provide advice and assistance in business growth and development of Party B. 业务发展。对乙方的业务发展提供建议和协助。

  • Strategic Plan (1) Within ninety (90) days, the Board shall adopt, implement, and thereafter ensure Bank adherence to a written strategic plan for the Bank covering at least a three-year period. The strategic plan shall establish objectives for the Bank's overall risk profile, earnings performance, growth, balance sheet mix, off-balance sheet activities, liability structure, capital adequacy, reduction in the volume of nonperforming assets, product line development and market segments that the Bank intends to promote or develop, together with strategies to achieve those objectives and, at a minimum, include:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!