Principles of Security. The Contractor acknowledges that the Authority places great emphasis on confidentiality, integrity and availability of information and consequently on the security of the Premises and the security for the Contractor System. The Contractor also acknowledges the confidentiality of the Authority's Data.
Principles of Security. 2.1 The Contractor acknowledges that the Authority places great emphasis on confidentiality, integrity and availability of information and consequently on the security of the Premises and the security for the Contractor System. The Contractor also acknowledges the confidentiality of the Authority's Data.
2.2 The Contractor shall be responsible for the security of the Contractor System and shall at all times provide a level of security which;
a) is in accordance with Good Industry Practice and Law;
b) complies with the Security Policy;
c) meets any specific security threats to the Contractor System; and
d) complies with ISO/IEC27002 and ISO/IEC27001 in accordance with paragraph 5 of this Schedule.
2.3 Without limiting paragraph 2.2, the Contractor shall at all times ensure that the level of security employed in the provision of the Services is appropriate to minimise the following risks:
a) loss of integrity of Authority Data;
b) loss of confidentiality of Authority Data;
c) unauthorised access to, use of, or interference with Authority Data by any person or organisation;
d) unauthorised access to network elements and buildings;
e) use of the Contractor System or Services by any third party in order to gain unauthorised access to any computer resource or Authority Data; and
f) loss of availability of Authority Data due to any failure or compromise of the Services.
Principles of Security. The Service Provider acknowledges that the Customer places great emphasis on the reliability of the performance of the Services, confidentiality, integrity and availability of information and consequently on security. The Service Provider shall be responsible for the effective performance of its security obligations and shall at all times provide a level of security which: is in accordance with the Law and this Call Off Contract; as a minimum demonstrates Good Industry Practice; complies with the Security Policy; meets any specific security threats of immediate relevance to the Services and/or the Customer Data; and complies with the Customer’s ICT Policy. Subject to Clause 34 of this Call Off Contract (Security and Protection of Information) the references to standards, guidance and policies contained or set out in paragraph 75.2 of this Call Off Schedule 7 shall be deemed to be references to such items as developed and updated and to any successor to or replacement for such standards, guidance and policies, as notified to the Service Provider from time to time. In the event of any inconsistency in the provisions of the above standards, guidance and policies, the Service Provider should notify the Customer's Representative of such inconsistency immediately upon becoming aware of the same, and the Customer's Representative shall, as soon as practicable, advise the Service Provider which provision the Service Provider shall be required to comply with.
Principles of Security. The Supplier acknowledges that the Customer places great emphasis on the reliability of the performance of the Services, confidentiality, integrity and availability of information and consequently on security. The Supplier shall be responsible for the effective performance of its security obligations and shall at all times provide a level of security which: is in accordance with the Law and this Call Off Contract;
Principles of Security. 2.1 The Supplier acknowledges that the Customer places great emphasis on the confidentiality, integrity and availability of information and consequently on the security provided by the ISMS.
2.2 The Supplier shall be responsible for the effective performance of the ISMS and shall at all times provide a level of security which:
2.2.1 is in accordance with Good Industry Practice, Law, Standards and this Contract;
2.2.2 complies with the Security Policy;
2.2.3 [complies with at least the minimum set of security measures and standards as determined by the Security Policy Framework (Tiers 1-4) available from the Cabinet Office Security Policy Division (COSPD)];
2.2.4 meets any specific security threats to the ISMS;
2.2.5 complies with ISO/IEC 27001 and ISO/IEC27002 in accordance with paragraph 5 of this schedule;
2.2.6 complies with the Customer’s security requirements as set out in the Letter of Appointment; and
2.2.7 complies with the Customer’s ICT standards.
2.3 Without limiting Paragraph 2.2 above, the Supplier shall at all times ensure that the level of security employed in the provision of the Contract Services is appropriate to maintain the following at acceptable risk levels (to be defined by the Customer from time to time):
2.3.1 loss of integrity and confidentiality of Customer Confidential Information;
2.3.2 unauthorised access to, use or disclosure of, or interference with Customer Confidential Information by any person or organisation;
2.3.3 unauthorised access to network elements, buildings, the Sites and tools (including Equipment) used by the Supplier and any Sub-contractors in the provision of the Contract Services;
2.3.4 use of the Supplier System or Contract Services by any third party in order to gain unauthorised access to any computer resource or Customer Data; and
2.3.5 loss of availability of Customer Confidential Information due to any failure or compromise of the Contract Services.
2.4 Subject to Clause 6A.3 the references to standards, guidance and policies set out in paragraph 2.2 shall be deemed to be references to such items as developed and updated and to any successor to or replacement for such standards, guidance and policies, from time to time.
2.5 In the event of any inconsistency in the provisions of the above standards, guidance and policies, the Supplier should notify the Customer's Representative of such inconsistency immediately upon becoming aware of the same, and the Customer's Representative shall, as soon as practica...
Principles of Security. The Provider acknowledges that the Authority places great emphasis on confidentiality, integrity and availability of information and consequently on the security of the Premises and the security for the Provider System. The Provider also acknowledges the confidentiality of the Authority's Data.
Principles of Security. 2.1 The Supplier acknowledges that the Customer places great emphasis on the confidentiality, integrity and availability of information and consequently on the security provided by the ISMS.
2.2 The Supplier shall be responsible for the effective performance of the ISMS and shall at all times provide a level of security which:
2.2.1 is in accordance with Good Industry Practice, Law and this Contract;
2.2.2 complies with the Security Policy;
2.2.3 meets any specific security threats to the ISMS;
2.2.4 complies with the security requirements as set out in paragraph 2.5 of the Order Form; and
2.2.5 complies with the Customer‟s ICT standards.
2.3 Subject to clause 21.1.3, the references to standards, guidance and policies set out in paragraph 2.2 shall be deemed to be references to such items as developed and updated and to any successor to or replacement for such standards, guidance and policies, from time to time.
2.4 In the event of any inconsistency in the provisions of the above standards, guidance and policies, the Supplier should notify the Customer's Representative of such inconsistency immediately upon becoming aware of the same, and the Customer's Representative shall, as soon as practicable, advise the Supplier which provision the Supplier shall be required to comply with.
Principles of Security. 2.1 The CONTRACTOR acknowledges that the CUSTOMER places great emphasis on the confidentiality, integrity and availability of information and consequently on the security provided by the ISMS.
2.2 The CONTRACTOR shall be responsible for the effective performance of the ISMS and shall at all times provide a level of security which:
2.2.1 is in accordance with Good Industry Practice, Law and this Contract;
2.2.2 complies with the Security Policy;
2.2.3 complies with at least the minimum set of security measures and standards as determined by the Security Policy Framework (Tiers 1-4) available from the Cabinet Office Security Policy Division (COSPD);
2.2.4 meets any specific security threats to the ISMS;
2.2.5 complies with ISO/IEC27001 and ISO/IEC27002 in accordance with paragraph 5 of this Schedule;
2.2.6 complies with the security requirements as set out in Schedule 2-2; and
2.2.7 complies with the CUSTOMER’s ICT standards.
2.3 Subject to Clause 16.3 of this Contract, the references to standards, guidance and policies set out in paragraph 2.2 of this Schedule shall be deemed to be references to such items as developed and updated and to any successor to or replacement for such standards, guidance and policies, from time to time.
2.4 In the event of any inconsistency in the provisions of the above standards, guidance and policies, the CONTRACTOR should notify the CUSTOMER's CITHS Contract Manager of such inconsistency immediately upon becoming aware of the same, and the CUSTOMER's CITHS Contract Manager shall, as soon as practicable, advise the CONTRACTOR which provision the CONTRACTOR shall be required to comply with.
Principles of Security. 2.1 The Contractor acknowledges that the Authority places great emphasis on confidentiality, integrity and availability of information and consequently on the security of the Premises and the security for the Contractor System. The Contractor also acknowledges the confidentiality of Authority Data.
2.2 The Contractor shall be responsible for the security of the Contractor System and shall at all times provide a level of security which:
2.2.1 is in accordance with Good Industry Practice and Law;
2.2.2 complies with HMG Security Policy Framework;
2.2.3 meets any specific security threats to the Contractor System; and
2.2.4 complies with Information Assurance Standards.
2.3 Without limiting paragraph 2.2, the Contractor shall at all times ensure that the level of security employed in the provision of the Goods and/or Services is appropriate to maintain the following at acceptable risk levels (to be defined by the Authority):
2.3.1 loss of integrity of Authority Data;
2.3.2 loss of confidentiality of Authority Data;
2.3.3 unauthorised access to, use of, or interference with Authority Data by any person or organisation;
2.3.4 unauthorised access to network elements, buildings, the Premises, and tools used by the Contractor in the provision of the Goods and/or Services;
2.3.5 use of the Contractor System or Goods and/or Services by any third party in order to gain unauthorised access to any computer resource or Authority Data; and
2.3.6 loss of availability of Authority Data due to any failure or compromise of the Goods and/or Services.
Principles of Security. 1The Supplier acknowledges that the Customer places great emphasis on the confidentiality, integrity and availability of information and consequently on the security provided by the ISMS.