SOV Cybersecurity Standard 19-01 Sample Clauses

SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives Taxes Due to the State. Contractor certifies under the pains and penalties of perjury that, as of the date this contract amendment is signed, the Contractor is in good standing with respect to, or in full compliance with a plan to pay, any and all taxes due the State of Vermont. Child Support (Applicable to natural persons only; not applicable to corporations, partnerships or LLCs). Contractor is under no obligation to pay child support or is in good standing with respect to or in full compliance with a plan to pay any and all child support payable under a support order as of the date of this amendment.
AutoNDA by SimpleDocs
SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives
SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives Contractor further certifies under pains and penalties of perjury that, as of the date this contract amendment is signed, Contractor is not presently debarred, suspended, nor named on the State’s debarment list at: xxxxx://xxx.xxxxxxx.xxx/purchasing-contracting/debarment This document consists of 9 pages. Except as modified by this Amendment No. 1, all provisions of the Contract remain in full force and effect. The signatures of the undersigned indicate that each has read and agrees to be bound by this Amendment to the Contract. BY THE STATE OF VERMONT: BY THE CONTRACTOR: 2/22/2022 XXXXXX DE XX XXXXXX DATE DVHA Commissioner NOB 1 South, 000 Xxxxx Xxxxx Xxxxxxxxx, XX 00000-0000 Phone: 000-000-0000 Email: Xxxxxx.Xxxxxxxxxx@xxxxxxx.xxx XXXX XXXXXXXX DATE MEMBER 00000 Xxxxx Xxxxxxx Xxxxxx, Xxxxx 000 Xxxxxx Xxxxx, XX 00000 Phone: (000) 000-0000 Email: XXxxxxxxx@xxxx.xxx ATTACHMENT E BUSINESS ASSOCIATE AGREEMENT SOV CONTRACTOR: Xxxxx and Xxxxxxxx SOV CONTRACT No. 39766 CONTRACT Effective DATE: April 1, 2020 THIS BUSINESS ASSOCIATE AGREEMENT (“AGREEMENT”) IS ENTERED INTO BY AND BETWEEN THE STATE OF VERMONT AGENCY OF HUMAN SERVICES, OPERATING BY AND THROUGH ITS AGENCY OF HUMAN SERVICES (“COVERED ENTITY”) AND PARTY IDENTIFIED IN THIS AGREEMENT AS CONTRACTOR OR GRANTEE ABOVE (“BUSINESS ASSOCIATE”). THIS AGREEMENT SUPPLEMENTS AND IS MADE A PART OF THE CONTRACT OR GRANT (“CONTRACT OR GRANT”) TO WHICH IT IS ATTACHED. Covered Entity and Business Associate enter into this Agreement to comply with the standards promulgated under the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), including the Standards for the Privacy of Individually Identifiable Health Information, at 45 CFR Parts 160 and 164 (“Privacy Rule”), and the Security Standards, at 45 CFR Parts 160 and 164 (“Security Rule”), as amended by Subtitle D of the Health Information Technology for Economic and Clinical Health Act (HITECH), and any associated federal rules and regulations. The parties agree as follows:
SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives Child Support (Applicable to natural persons only; not applicable to corporations, partnerships or LLCs). Contractor is under no obligation to pay child support or is in good standing with respect to or in full compliance with a plan to pay any and all child support payable under a support order as of the date of this amendment.
SOV Cybersecurity Standard 19-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives REQUIRED PRIOR APPROVALS All SOW Agreements, regardless of value, shall be approved by the Vermont Chief Information Officer/Secretary of the Agency of Digital Services prior to execution. CIO Approval Date All SOW Agreements valued at $25,000 or more per year shall be certified by the Vermont Office of the Attorney General in accordance with 3 V.S.A. § 342 prior to execution. Further, there shall be no limitation of liability, including a waiver of consequential, indirect, special, punitive or exemplary damages, or disclaimers of warranty without approval from the Office of the Attorney General. Certified by Date WE THE UNDERSIGNED PARTIES AGREE TO BE BOUND BY THIS SOW AGREEMENT. <CrossWind Technologies Inc.> Signature Date STATE OF VERMONT, <Insert Requesting Agency or business unit> Signature Date Purpose ATTACHMENT F: Valcour CAD/RMS System Policies Agency Agreement Valcour is a proprietary software solution, developed by CrossWind Technologies, (hereinafter “CrossWind”) and designed exclusively for legitimate law enforcement use. Valcour is designed to be used by multiple departments or agencies as a secure automated Computer Aided Dispatch, Records Management, and Mobile Computing system that gathers data for a variety of criminal justice purposes, including but not limited to, records of services rendered, incident/event information, information about persons involved in investigations, crimes reported, arrests, stolen and recovered property and crime data.
SOV Cybersecurity Standard 19-01. As of the Effective Date, All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 19-01 (as drafted as of the Effective Date), which Contractor acknowledges has been provided to it, and is available on-line at the following URL: xxxxx://xxxxxxxxxxxxxxx.xxxxxxx.xxx/cybersecurity/cybersecurity-standards-and-directives. In the event the aforementioned statute is revised, the parties will use reasonable efforts to negotiate an amendment to this Agreement to attempt to incorporate such revised statute. Attachment F

Related to SOV Cybersecurity Standard 19-01

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Network Etiquette The user is expected to abide by the generally accepted rules of network etiquette. These include, but are not limited to, the following:

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!