CYBER SECURITY REQUIREMENTS Sample Clauses
The Cyber Security Requirements clause sets out the obligations and standards that parties must follow to protect digital systems, data, and networks from cyber threats. Typically, this clause details specific security measures such as encryption, access controls, regular security assessments, and incident response protocols that must be implemented by the parties involved. Its core practical function is to minimize the risk of data breaches and cyberattacks, ensuring that sensitive information remains secure and that both parties are clear on their responsibilities regarding cyber security.
POPULAR SAMPLE Copied 9 times
CYBER SECURITY REQUIREMENTS. The cyber security requirements applicable to this Contract are set out in this Annex. Section A (Cyber Security Requirements) includes the Purchaser’s requirements in connection with cyber security [and Section B (Cyber Implementation Plan) sets out further details on how the Service Provider will meet such requirements].
CYBER SECURITY REQUIREMENTS. The cyber security requirements applicable to this Contract are set out in this Annex. Section A (Cyber Security Requirements) includes the Purchaser’s requirements in connection with cyber security [and Section B (Cyber Implementation Plan) sets out further details on how the Service Provider will meet such requirements]. Guidance notes: The Purchaser should retain the reference to Section B above if: the Cyber Security Procurement Support Tool (CSPST) has been used in connection with this Contract; and the Service Provider and the Purchaser have agreed a Cyber Implementation Plan in conjunction with the SAQ report generated by the CSPST.
CYBER SECURITY REQUIREMENTS. The following obligations shall apply with respect to this Contract.
CYBER SECURITY REQUIREMENTS. A new Clause 34.6 shall be added as follows:
CYBER SECURITY REQUIREMENTS. In addition to mandatory cyber security flowdown requirements, the following additional provisions apply.
CYBER SECURITY REQUIREMENTS. Overview of requirements: The Service Provider shall meet the following requirements:
CYBER SECURITY REQUIREMENTS. The cyber security requirements applicable to the Contract are set out in the Specification (and the Service Provider’s Technical Response at Schedule 12).
CYBER SECURITY REQUIREMENTS. Contractor shall ensure all Information Security users are appropriately trained in accordance with SECNAVINST 5239.20, Department of the Navy Cyberspace Information Technology and Cybersecurity Workforce Management and Qualification, 10 February 2016, SECNAVINST 5239.3, Department of the Navy Cybersecurity Policy, 02 May 2016, and DoD Instruction 8510.01, Risk Management Framework (RMF) for DoD Information Technology (IT), 12 March 2014, to fulfill cybersecurity responsibilities before allowing contractors access to systems or networks.
CYBER SECURITY REQUIREMENTS. In performing its obligations and exercising its rights under this Agreement, each Party warrants and represents to the other Party that it will maintain adequate administrative, technical, and physical measures, controls, tools, systems, policies and procedures in accordance with good cyber security industry practice and all Applicable Laws.
CYBER SECURITY REQUIREMENTS. Supplier:
(a) represents and warrants to OPG that: (i) Supplier has a written and enforceable cyber security policy, and has established and maintains a cyber security program that is designed and implemented to prevent, detect and respond to cyber attacks that may impact OPG Systems and Information; and (ii) Supplier’s Personnel (which, for the purposes of these requirements, includes any Supplier personnel having access to OPG Systems and Information) have completed position-appropriate cyber security training;
(b) will immediately revoke all access to OPG Systems and Information for any Supplier’s Personnel who is terminated or no longer needs access to OPG Systems and Information;
(c) will notify OPG by sending an email to ▇▇▇▇@▇▇▇.▇▇▇ within 48 hours after discovering any security breach, incident or vulnerability impacting or otherwise involving OPG Systems and Information (including any Cyber Equipment if Supplier, acting reasonably, believes any such security breach, incident or vulnerability may have impacted or may potentially impact OPG Systems and Information), and furthermore if such security breach, incident or vulnerability relates to any Cyber Asset, Cyber Equipment, or Cyber Services, Supplier will also: (i) include in such written notification of any security breach, incident or vulnerability to OPG a description of the breach, incident or vulnerability, its potential security impact, its root cause, a remediation plan, and recommended mitigating or corrective actions; and (ii) promptly and continuously cooperate and coordinate with OPG to prevent, stop, contain, mitigate, resolve, recover from, respond to, and otherwise deal with any security breach, incident or vulnerability, including by providing OPG with ongoing status reports;