Contractor Security Policy definition

Contractor Security Policy a high level document which defines the business objectives and legal regulations aligned to the Contractor’s information security objectives. The document should give an overview of the internal policies relevant to information security and the security mechanisms deployed for physical, technical/logical and administrative controls.
Contractor Security Policy has the meaning given in paragraph 1.1 of Part B of Schedule 2.5 (Security Management Plan);

Examples of Contractor Security Policy in a sentence

  • COI acknowledges that the Contractor Security Policy is highly commercially sensitive, and that the Contractor is under no obligation to disclose it to COI.

  • The Library shall maintain a Contractor Security Policy with rules for acceptable use of the Library’s information assets and systems.

  • All versions of the Contractor Security Policy, all versions of the ISMS (together with evidence of the certification of the ISMS by a UKAS Entity), all versions of the Security Management Plan and any other documentation and plans referred to in Schedule 2.5 (Security Management Plan).

  • In relation to the Contractor’s storage and use of the Authority Data, the Contractor shall comply, and shall procure the compliance of Staff, with the Contractor Security Policy (with the exception of the transfer of data by disc) and with the Overarching Security Requirements.

  • Contractors working on-site, accessing the Library’s network remotely or working off-site with Library information assets shall receive a written copy of the Contractor Security Policy which must be signed and returned before access is granted.

  • Contractors working on-site,accessing the Library’s network remotely or working off-site with Library information assets shall receive a written copy of the Contractor Security Policy which must be signed and returned before access is granted.

  • Any updated version of the Contractor Security Policy under this paragraph 6 shall be subject to the prior written approval of the DCC.

  • MCGUINNESS, City Attorney By: Exhibit H – City of Escondido IT Contractor Security Policy and IT Cloud Contractor Security Policy‌CONTRACTOR SHALL COMPLY WITH THE FOLLOWING SECURITY POLICES, ANY DIVIATION FROM THE POLICIES MUST BE CLEARLY STATED AS AN RFP EXCEPTION USING EXHBIT F.

  • The Contractor's security policy relating to the Contractor Solution ("Contractor Security Policy") is set out in Appendix 2.

  • I tried different thresholds in these scripts to find the better ones.This report is divided on four part.

Related to Contractor Security Policy

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Indigenous Peoples Safeguards means the principles and requirements set forth in Chapter V, Appendix 3, and Appendix 4 (as applicable) of the SPS;

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Security Bond means an amount payable by a tenant as security for the performance of his obligations under a residential tenancy agreement, including an amount referred to in section 29(1)(b)(ii);

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • technical and organizational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Data Security Requirements means the following, in each case to the extent relating to any sensitive or confidential information, or any matters relating to data privacy, protection, or security or the access, collection, use, processing, storage, sharing, distribution, transfer, disclosure, destruction, or disposal of any personally identifiable information: (i) all applicable Laws and any related security breach notification requirements, (ii) the Conveyed Companies’ own respective rules, policies, and procedures, and (iii) Contracts to which the Conveyed Companies are bound.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Insurance Provider s Tender” means the completed Tendering Document submitted by the Insurance Provider to the Procuring Entity

  • Contractor System means the information and communications technology system used by the Contractor in performing the Services including the Software, the Contractor Equipment and related cabling (but excluding the Authority System).

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • Data Protection Impact Assessment means an assessment by the Controller of the impact of the envisaged processing on the protection of Personal Data.

  • Contractor Sensitive Information means any information provided by the Contractor to the Authority (disregarding any protective marking or assertion of confidentiality) which: is specified as Contractor Sensitive Information in Schedule 7 and has not lost its sensitivity according to the justifications and durations set out in that Schedule; and is exempt information pursuant to sections 33(1) or 36, 38 or 39 of FOISA (having regard for that purpose to the public interest there might be in disclosing such information as referred to in section 2(1)(b) of FOISA).

  • air traffic control service means a service provided for the purpose of:

  • Standard Hazard Insurance Policy means a fire and casualty extended coverage insurance policy in such amount and with such coverage as required by this Agreement.

  • Health insurance policy means a policy that provides specified benefits for hospital and/or general treatment and meets all requirements under section 63-10 of the Private Health Insurance Act 2007.

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Continuing education provider or “CE provider” means an individual or entity that is approved to offer continuing education courses pursuant to [insert reference in State law or regulations governing producer continuing education course approval].