Cybersecurity Condition Sample Clauses

A Cybersecurity Condition clause sets requirements and standards for protecting digital information and systems from unauthorized access, breaches, or cyberattacks. It typically obligates parties to implement specific security measures, such as encryption, regular software updates, or incident response protocols, and may require prompt notification in the event of a security incident. The core function of this clause is to reduce the risk of data breaches and ensure that all parties maintain adequate cybersecurity practices, thereby protecting sensitive information and minimizing potential liabilities.
POPULAR SAMPLE Copied 1 times
Cybersecurity Condition. (a) The recipient agrees that when collecting and managing environmental data under this assistance agreement, it will protect the data by following all applicable State or Tribal law cybersecurity requirements. (1) EPA must ensure that any connections between the recipient’s network or information system and EPA networks used by the recipient to transfer data under this agreement, are secure. For purposes of this Section, a connection is defined as a dedicated persistent interface between an Agency IT system and an external IT system for the purpose of transferring information. Transitory, user-controlled connections such as website browsing are excluded from this definition. If the recipient’s connections as defined above do not go through the Environmental Information Exchange Network or EPA’s Central Data Exchange, the recipient agrees to contact the EPA Project Officer no later than 90 days after the date of this award and work with the designated Regional/Headquarters Information Security Officer to ensure that the connections meet EPA security requirements, including entering into Interconnection Service Agreements as appropriate. This condition does not apply to manual entry of data by the recipient into systems operated and used by EPA’s regulatory programs for the submission of reporting and/or compliance data. (2) The recipient agrees that any subawards it makes under this agreement will require the subrecipient to comply with the requirements in (b)(1) if the subrecipient’s network or information system is connected to EPA networks to transfer data to the Agency using systems other than the Environmental Information Exchange Network or EPA’s Central Data Exchange. The recipient will be in compliance with this condition: by including this requirement in subaward agreements; and during subrecipient monitoring deemed necessary by the recipient under 2 CFR 200.332(d), by inquiring whether the subrecipient has contacted the EPA Project Officer. Nothing in this condition requires the recipient to contact the EPA Project Officer on behalf of a subrecipient or to be involved in the negotiation of an Interconnection Service Agreement between the subrecipient and EPA.
Cybersecurity Condition. EPA must ensure that any connections between the Grantee’s network or information system and EPA networks used by the Grantee to transfer data under this agreement, are secure. The Grantee shall comply with the following requirements if the Grantee’s network or information system is connected to EPA networks to transfer data to the Agency using systems other than the Environmental Information Exchange Network or EPA’s Central Data Exchange: If the Grantee’s connections do not go through the Environmental Information Exchange Network or EPA’s Central Data Exchange, the Grantee agrees to contact the EPA Project Officer (PO) and work with the designated Regional/Headquarters Information Security Officer to ensure that the connections meet EPA security requirements, including entering into Interconnection Service Agreements as appropriate. This condition does not apply to manual entry of data by the recipient into systems operated and used by EPA’s regulatory programs for the submission of reporting and/or compliance data. For the purposes of this paragraph, a connection is defined as a dedicated persistent interface between an Agency IT system and an external IT system for the purpose of transferring information. Transitory, user-controlled connections such as website browsing are excluded from this definition.
Cybersecurity Condition 

Related to Cybersecurity Condition

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Operator’s Security Contact Information ▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Named Security Contact ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇.▇▇▇ Email of Security Contact (▇▇▇) ▇▇▇-▇▇▇▇ Phone Number of Security Contact