Common use of The Information Security Trustee Clause in Contracts

The Information Security Trustee. 4.7.1. The Information Security Trustee shall serve as the liason with the Information and Computers Department on behalf of the provider throughout the contract period, coordinating all the actions required on the part of the provider by the provisions herein with the Information and Computers Department on all matters related to information security. 4.7.2. The Information Security Trustee shall attend an introductory meeting with an authorized representative of the Information and Security Department and undergo information security briefing by the authorized representative no later than 7 days before beginning on the provision of services according to the present tender. 4.7.3. The Information Security Trustee shall receive detailed briefing from an authorized representative of the Information and Computers Department, no later than one week after the appointment of the Information Security Trustee. The briefing shall include explanations and clarifications of the provisions thereof. In addition, the Information Security Trustee shall be provided with additional general requirements and procedures that apply to all the persons making operations related to the Authority's computer system with which the Information Security Trustee shall be required to comply and which he or she shall be required to instill in the employees of the provider and any other person acting on the provider's behalf. 4.7.4. The Information Security Trustee must be closely familiar with the provisions herein and with the other relevant information security procedures that apply to the provider and any person on its behalf, and shall enforce them. 4.7.5. The Information Security Trustee is required to maintain regular contact with an authorized representative of the Information and Computers Department or another representative of the IAA serving as the contact person on behalf of the Information and Computers Department on these matters, as required. 4.7.6. The Information Security Trustee shall approve by signature on any matter / application related to information security in the computer systems of the provider or to the connection to the IAA's computer systems from the systems of the provider that may have an impact on the system's connectivity and operation. 4.7.7. The Information Security Trustee is required to brief and update the employees of the provider on the applicable provisions and procedures, including those added from time to time. 4.7.8. The provider shall provide the Information and Computers Department with the name and information of its Information Security Trustee nominee for approval in accordance with Section 5 below. 4.7.9. The provider undertakes to transfer all the aforementioned information. 4.7.10. The Information and Computers Department shall be entitled to require additional information beyond that specified in Section 5 below, to reject nominees and require the provider to present other nominees instead of those rejected and to replace an elected nominee - all at any time, at its sole discretion and without being required to provide any explanation regarding these decisions.

Appears in 5 contracts

Samples: Consultancy Services Agreement, Contract for Design, Supply, Installation, Commissioning and Maintenance of an Advanced Visual Docking Guidance System, Air Service Development Marketing Services Agreement

AutoNDA by SimpleDocs

The Information Security Trustee. 4.7.1. The Information Security Trustee shall serve as the liason with the Information and Computers Department on behalf of the provider throughout the contract period, coordinating all the actions required on the part of the provider by the provisions herein with the Information and Computers Department on all matters related to information security. 4.7.2. The Information Security Trustee shall attend an introductory meeting with an authorized representative of the Information and Security Department and undergo information security briefing by the authorized representative no later than 7 days before beginning on the provision of services according to the present tender. 4.7.3. The Information Security Trustee shall receive detailed briefing from an authorized representative of the Information and Computers Department, no later than one week after the appointment of the Information Security Trustee. The briefing shall include explanations and clarifications of the provisions thereof. In addition, the Information Security Trustee shall be provided with additional general requirements and procedures that apply to all the persons making operations related to the Authority's computer system with which the Information Security Trustee shall be required to comply and which he or she shall be required to instill in the employees of the provider and any other person acting on the provider's behalf. 4.7.4. The Information Security Trustee must be closely familiar with the 68 provisions herein and with the other relevant information security procedures that apply to the provider and any person on its behalf, and shall enforce them. 4.7.5. The Information Security Trustee is required to maintain regular contact with an authorized representative of the Information and Computers Department or another representative of the IAA serving as the contact person on behalf of the Information and Computers Department on these matters, as required. 4.7.6. The Information Security Trustee shall approve by signature on any matter / application related to information security in the computer systems of the provider or to the connection to the IAA's computer systems from the systems of the provider that may have an impact on the system's connectivity and operation. 4.7.7. The Information Security Trustee is required to brief and update the employees of the provider on the applicable provisions and procedures, including those added from time to time. 4.7.8. The provider shall provide the Information and Computers Department with the name and information of its Information Security Trustee nominee for approval in accordance with Section 5 below. 4.7.9. The provider undertakes to transfer all the aforementioned information. 4.7.10. The Information and Computers Department shall be entitled to require additional information beyond that specified in Section 5 below, to reject nominees and require the provider to present other nominees instead of those rejected and to replace an elected nominee - all at any time, at its sole discretion and without being required to provide any explanation regarding these decisions.

Appears in 1 contract

Samples: Contract for Design, Supply, Installation, Commissioning and Maintenance of a Power Plant

AutoNDA by SimpleDocs

The Information Security Trustee. 4.7.1. The Information Security Trustee shall serve as the liason with the Information and Computers Department on behalf of the provider throughout the contract period, coordinating all the actions required on the part of the provider by the provisions herein with the Information and Computers Department on all matters related to information security. 4.7.2. The Information Security Trustee shall attend an introductory meeting with an authorized representative of the Information and Security Department and undergo information security briefing by the authorized representative no later than 7 days before beginning on the provision of services according to the present tender. 4.7.3. The Information Security Trustee shall receive detailed briefing from an authorized representative of the Information and Computers Department, no later than one week after the appointment of the Information Security Trustee. The briefing shall include explanations and clarifications of the provisions thereof. In addition, the Information Security Trustee shall be provided with additional general requirements and procedures that apply to all the persons making operations related to the Authority's computer system with which the Information Security Trustee shall be required to comply and which he or she shall be required to instill in the employees of the provider and any other person acting on the provider's behalf. 4.7.4. The Information Security Trustee must be closely familiar with the provisions herein and with the other relevant information security procedures that apply to the provider and any person on its behalf, and shall enforce them. 4.7.5. The Information Security Trustee is required to maintain regular contact with an authorized representative of the Information and Computers Department or another representative of the IAA serving as the contact person on behalf of the Information and Computers Department on these matters, as required. 4.7.6. The Information Security Trustee shall approve by signature on any matter / application related to information security in the computer systems of the provider or to the connection to the IAA's computer systems from the systems of the provider that may have an impact on the system's connectivity and operation. 4.7.7. The Information Security Trustee is required to brief and update the employees of the provider on the applicable provisions and procedures, including those added from time to time. 4.7.8. The provider shall provide the Information and Computers Department with the name and information of its Information Security Trustee nominee for approval in accordance with Section 5 below. 4.7.9. The provider undertakes to transfer all the aforementioned information. 4.7.10. The Information and Computers Department shall be entitled to require additional information beyond that specified in Section 5 below, to reject nominees and require the provider to present other nominees instead of those rejected and to replace an elected nominee - all at any time, at its sole discretion and without being required to provide any explanation regarding these decisions.

Appears in 1 contract

Samples: Contract for Design, Supply, Installation, Commissioning and Support of Passenger Boarding Bridges

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!