State of SC Specific Terms & Conditions – Information Security and Use Sample Clauses

State of SC Specific Terms & Conditions – Information Security and Use. INFORMATION SECURITY - DEFINITIONS (FEB 2015) Compromise means disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. Without limitation, the term “compromise” includes copying the data through covert network channels, or copying the data to unauthorized media, or disclosure of information in violation of any obligation imposed by this contract. Information means any communication or representation of knowledge such as facts, statistics, or opinions, in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual. Information system means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Public information means any specific information, regardless of form or format, that the State has actively and intentionally disclosed, disseminated, or made available to the public. Information is not public information solely because it may be subject to inspection pursuant to an unfulfilled public records request. Software means any computer program accessed or used by the State Agency/Using Governmental Unit or a third party pursuant to or as a result of this contract. Third party means any person or entity other than the State Agency/Using Governmental Unit, the Contractor, or any subcontractors at any tier. Unrestricted information means (1) public information acquired other than through performance of the work, (2) information acquired by Contractor prior to contract formation, (3) information incidental to your contract administration, such as financial, administrative, cost or pricing, or management information, and (4) any ideas, concepts, know-how, methodologies, processes, technologies, techniques which Contractor develops or learns in connection with Contractor’s performance of the work. Web-based service means a service accessed over the Internet and acquired, accessed, or used by the State Agency/Using Governmental Unit or a third party pursuant to or as a result of this contract, including without limitation, cloud services, software-as-a-service, and hosted computer services. INFORMATION SECURITY - SAFEGUARDING REQUIREMENTS (FEB 2015)
AutoNDA by SimpleDocs
State of SC Specific Terms & Conditions – Information Security and Use. INFORMATION SECURITY - DEFINITIONS (FEB 2015) Compromise means disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. Without limitation, the term “compromise” includes copying the data through covert network channels, or copying the data to unauthorized media, or disclosure of information in violation of any obligation imposed by this contract. Information means any communication or representation of knowledge such as facts, statistics, or opinions, in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual. Information system means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Public information means any specific information, regardless of form or format, that the State has actively and intentionally disclosed, disseminated, or made available to the public. Information is not public information solely because it may be subject to inspection pursuant to an unfulfilled public records request. Software means any computer program accessed or used by the State Agency/Using Governmental Unit or a third party pursuant to or as a result of this contract. Third party means any person or entity other than the State Agency/Using Governmental Unit, the Contractor, or any subcontractors at any tier. Unrestricted information means (1) public information acquired other than through performance of the work,
State of SC Specific Terms & Conditions – Information Security and Use. INFORMATION SECURITY - DEFINITIONS (FEB 2015) Compromise means disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. Without limitation, the term “compromise” includes copying the data through covert network channels, or copying the data to unauthorized media, or disclosure of information in violation of any obligation imposed by this contract. Data means a subset of information in an electronic format that allows it to be retrieved or transmitted. Government information means information (i) provided to Contractor by, or generated by Contractor for, the Using Governmental Unit, or (ii) acquired or accessed by Contractor as a result of performing the Work. Without limiting the foregoing, government information includes any information that Contractor acquires or accesses by software or web-based services, which includes, without limitation, any metadata or location data. Government information excludes unrestricted information. Information means any communication or representation of knowledge such as facts, statistics, or opinions, in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual. Information system means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Public information means any specific information, regardless of form or format, that the State has actively and intentionally disclosed, disseminated, or made available to the public. Information is not public information solely because it may be subject to inspection pursuant to an unfulfilled public records request. Software means any computer program accessed or used by the State Agency/Using Governmental Unit or a third party pursuant to or as a result of this contract. Third party means any person or entity other than the State Agency/Using Governmental Unit, the Contractor, or any subcontractors at any tier. Unrestricted information means (1) public information acquired other than through performance of the work,

Related to State of SC Specific Terms & Conditions – Information Security and Use

  • CLOUD SPECIFIC TERMS AND CONDITIONS To the extent that Contractor has received an award for Lot 3, Cloud, the following terms and conditions apply to Lot 3, Cloud. For the duration of an Authorized User Agreement, the Cloud Solution shall conform to the Cloud Solution Manufacturer’s specifications, Documentation, performance standards (including applicable license duration, warranties, guarantees, Service Level Agreements, service commitments, and credits). Contractor is responsible for providing physical and logical security for all Data, infrastructure (e.g. hardware, networking components, physical devices), and software related to the services the Contractor is providing under the Authorized User Agreement. All Data security provisions agreed to by the Authorized User and Contractor within the Authorized User Agreement may not be diminished for the duration of the Authorized User Agreement without prior written agreement by the parties amending the Authorized User Agreement.

  • Geographic Area and Sector Specific Allowances, Conditions and Exceptions The following allowances and conditions shall apply where relevant. Where the Employer does work which falls under the following headings, the Employer agrees to pay and observe the relevant respective conditions and/or exceptions set out below in each case.

  • Standard of Care; Reliance on Records and Instructions; Indemnification BISYS shall use its best efforts to ensure the accuracy of all services performed under this Agreement, but shall not be liable to the Trust for any action taken or omitted by BISYS in the absence of bad faith, willful misfeasance, negligence or from reckless disregard by it of its obligations and duties. The Trust agrees to indemnify and hold harmless BISYS, its employees, agents, directors, officers and nominees from and against any and all claims, demands, actions and suits, whether groundless or otherwise, and from and against any and all judgments, liabilities, losses, damages, costs, charges, counsel fees and other expenses of every nature and character arising out of or in any way relating to BISYS' actions taken or nonactions with respect to the performance of services under this Agreement or based, if applicable, upon reasonable reliance on information, records, instructions or requests given or made to BISYS by the Trust, the investment adviser and on any records provided by any fund accountant or custodian thereof; provided that this indemnification shall not apply to actions or omissions of BISYS in cases of its own bad faith, willful misfeasance, negligence or from reckless disregard by it of its obligations and duties; and further provided that prior to confessing any claim against it which may be the subject of this indemnification, BISYS shall give the Trust written notice of and reasonable opportunity to defend against said claim in its own name or in the name of BISYS.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Vendor’s Specific Warranties, Terms, and License Agreements Because TIPS serves public entities and non-profits throughout the nation all of which are subject to specific laws and policies of their jurisdiction, as a matter of standard practice, TIPS does not typically accept a Vendor’s specific “Sale Terms” (warranties, license agreements, master agreements, terms and conditions, etc.) on behalf of all TIPS Members. TIPS may permit Vendor to attach those to this Agreement to display to interested customers what terms may apply to their Supplemental Agreement with Vendor (if submitted by Vendor for that purpose). However, unless this term of the Agreement is negotiated and modified to state otherwise, those specific Sale Terms are not accepted by TIPS on behalf of all TIPS Members and each Member may choose whether to accept, negotiate, or reject those specific Sale Terms, which must be reflected in a separate agreement between Vendor and the Member in order to be effective.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Nonsurvival of Representations, Warranties and Agreements None of the representations, warranties, covenants and agreements in this Agreement or in any instrument delivered pursuant to this Agreement shall survive the Effective Time, except for those covenants and agreements contained herein and therein which by their terms apply in whole or in part after the Effective Time.

  • Certification Regarding Prohibition of Boycotting Israel (Tex Gov. Code 2271)

  • Specific Terms and Conditions To the extent that Contractor has received an award for Lot 4, Implementation Services, the following terms and conditions apply to Lot 4 Implementation Services. All Services covered under Lot 4 – Implementation Services must be performed within CONUS. An RFQ for this Lot will be awarded based on, and result in, a deliverable-based Statement of Work (SOW) which will be incorporated into an Authorized User Agreement. The RFQ will include but is not limited to: Authorized User timeframes; system integration requirements; and other risks that may affect the cost to the Authorized User. All responses to RFQs must include detailed price information, including but not limited to: hours required per title, cost per hour, etc. Travel, lodging and per diem costs must be itemized in the total quote and may not exceed the rates in the NYS OSC Travel Policy. More information can be found at xxxx://xxx.xxx.xxxxx.xx.xx/agencies/travel/travel.htm. All costs must be itemized and included in the Contractor’s quote. Article 17-B of the New York State Executive Law provides for more meaningful participation in public procurement by certified Service-Disabled Veteran-Owned Businesses (“SDVOB”), thereby further integrating such businesses into New York State’s economy. OGS recognizes the need to promote the employment of service-disabled veterans and to ensure that certified service-disabled veteran-owned businesses have opportunities for maximum feasible participation in the performance of OGS contracts. In recognition of the service and sacrifices made by service-disabled veterans and in recognition of their economic activity in doing business in New York State, Bidders are expected to consider SDVOBs in the fulfillment of the requirements of the Contract. Such participation may be as subcontractors or suppliers, as protégés, or in other partnering or supporting roles.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!