Examples of Information Security Management in a sentence
Federal Information Security Management Act (FISMA) Implementation Support p.
The legislatively mandated audits include the annual financial statement audit, and fulfilling the requirements of the Government Information Security Reform Act and its successor, the Federal Information Security Management Act.
The Ordering Activity is responsible for ensuring to the maximum extent practicable that each requirement issued is in compliance with the Federal Information Security Management Act (FISMA) as applicable.
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347.
After Buyer approval the Security Management Plan and Information Security Management System will apply during the Term of this Call-Off Contract.
See also “device, “appliance,” and “hardware,” “machine.” Term Definition Federal Information Security Management Act (FISMA) The Federal Information Security Management Act of 2002 ("FISMA", 44 U.S.C. § 3541, et seq.) is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002 (Pub.L. 107–347, 116 Stat.
These laws and regulations may apply but are not limited to: the Privacy Act of 1974; the Federal Information Security Management Act of 2002; theComputer Fraud and Abuse Act of 1986; the Health Insurance Portability and Accountability Act of 1996; the E- Government Act of 2002, the Clinger- Cohen Act of 1996; the Medicare Modernization Act of 2003, and the corresponding implementing regulations.
The Contractor’s IT Security Plan shall comply with Federal laws that include, but are not limited to, the Computer Security Act of 1987 (40 U.S.C. 1441 et seq.); the Government Information Security Reform Act of 2000; and the Federal Information Security Management Act of 2002; and with Federal policies and procedures that include, but are not limited to, OMB Circular A-130.
These laws and regulations may apply but are not limited to: The Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance Portability and Accountability Act of 1996; the E- Government Act of 2002, the Clinger- Cohen Act of 1996; the Medicare Modernization Act of 2003, and the corresponding implementing regulations.
Further information about IFS security practices is set forth in the IFS Information Security Management Document.