AUTHORITIES. The Contractor shall follow all current versions of Government policies and guidance accessible at ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/dhs-security-and-training-requirements-contractors, or available upon request from the Contracting Officer, including but not limited to: (1) DHS Management Directive 11042.1 Safeguarding Sensitive But Unclassified (for Official Use Only) Information (2) DHS Sensitive Systems Policy Directive 4300A (3) DHS 4300A Sensitive Systems Handbook and Attachments (4) DHS Security Authorization Process Guide (5) DHS Handbook for Safeguarding Sensitive Personally Identifiable Information (6) DHS Instruction Handbook ▇▇▇-▇▇-▇▇▇ Department of Homeland Security Personnel Suitability and Security Program (7) DHS Information Security Performance Plan (current fiscal year) (8) DHS Privacy Incident Handling Guidance (9) Federal Information Processing Standard (FIPS) 140-2 Security Requirements for Cryptographic Modules accessible at ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/groups/STM/cmvp/standards.html (10) National Institute of Standards and Technology (NIST) Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations accessible at ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/PubsSPs.html (11) NIST Special Publication 800-88 Guidelines for Media Sanitization accessible at ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/PubsSPs.html
Appears in 7 contracts
Sources: Blanket Purchase Agreement, Blanket Purchase Agreement (Bpa), Blanket Purchase Agreement (Bpa)
AUTHORITIES. The Contractor shall follow all current versions of Government policies and guidance accessible at ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/dhs-security-and-training-requirements-contractors, or available upon request from the Contracting Officer, including but not limited to:
(1) DHS Management Directive 11042.1 Safeguarding Sensitive But Unclassified (for Official Use Only) Information
(2) DHS Sensitive Systems Policy Directive 4300A
(3) DHS 4300A Sensitive Systems Handbook and Attachments
(4) DHS Security Authorization Process Guide
(5) DHS Handbook for Safeguarding Sensitive Personally Identifiable Information
(6) DHS Instruction Handbook ▇▇▇-▇▇-▇▇▇ Department of Homeland Security Personnel Suitability and Security Program
(7) DHS Information Security Performance Plan (current fiscal year)
(8) DHS Privacy Incident Handling Guidance
(9) Federal Information Processing Standard (FIPS) 140-2 Security Requirements for Cryptographic Modules accessible at ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/groups/STM/cmvp/standards.html
(10) National Institute of Standards and Technology (NIST) Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations accessible at ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/PubsSPs.htmlat
(11) NIST Special Publication 800-88 Guidelines for Media Sanitization accessible at ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/PubsSPs.html
Appears in 2 contracts
Sources: Indefinite Delivery Indefinite Quantity (Idiq) Contract, Indefinite Delivery Indefinite Quantity (Idiq) Contract
AUTHORITIES. The Contractor shall follow all current versions of Government policies and guidance accessible at ▇▇▇▇://h ttp://▇▇▇.▇▇▇.▇▇▇/dhs/▇▇▇-security▇▇▇▇▇▇▇▇-and▇▇▇-training▇▇▇▇▇▇▇▇-requirements▇▇▇▇▇▇▇▇▇▇▇▇-contractors▇▇▇▇▇▇▇▇▇▇▇, or available upon request from the Contracting Officer, including but not limited to:
(1) DHS Management Directive 11042.1 Safeguarding Sensitive But Unclassified (for Official Use Only) Information
(2) DHS Sensitive Systems Policy Directive 4300A
(3) DHS 4300A Sensitive Systems Handbook and Attachments
(4) DHS Security Authorization Process Guide
(5) DHS Handbook for Safeguarding Sensitive Personally Identifiable Information
(6) DHS Instruction Handbook ▇▇▇-▇▇-▇▇▇ Department of Homeland Security Personnel Suitability and Security Program
(7) DHS Information Security Performance Plan (current fiscal year)
(8) DHS Privacy Incident Handling Guidance
(9) Federal Information Processing Standard (FIPS) 140-2 Security Requirements for Cryptographic Modules accessible at ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/groups/STM/cmvp/standards.html
(10) National Institute of Standards and Technology (NIST) Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations accessible at ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/PubsSPs.html
(11) NIST Special Publication 800-88 Guidelines for Media Sanitization accessible at ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/publications/PubsSPs.html
Appears in 1 contract
Sources: Gsa Stars Ii Idiq Contract