Cybersecurity Requirements Sample Clauses

The Cybersecurity Requirements clause sets out the obligations and standards that parties must follow to protect digital information and systems from unauthorized access, breaches, or cyberattacks. Typically, this clause mandates the implementation of specific security measures such as encryption, regular software updates, employee training, and incident response protocols. By clearly defining these expectations, the clause helps ensure that sensitive data is safeguarded and reduces the risk of cyber incidents, thereby allocating responsibility and minimizing potential liabilities related to cybersecurity threats.
POPULAR SAMPLE Copied 1 times
Cybersecurity Requirements. Seller shall comply with the cybersecurity requirements identified in Exhibit Q.
Cybersecurity Requirements all applicable laws, regulations, codes, guidance (from regulatory and advisory bodies, whether mandatory or not), international and national standards, and sanctions relating to security of network and information systems and security breach and incident reporting requirements, including the Data Protection Legislation, the Cybersecurity Directive (EU) 2016/1148), Commission Implementing Regulation (EU) 2018/151), the Network and Information Systems Regulations 2018 (SI 506/2018), all as amended or updated from time to time.
Cybersecurity Requirements. The Contractor shall maintain strong cybersecurity practices throughout the contract period: a. Threat Detection & Response: Deploy AI-based threat detection tools. Define incident response plans and test them regularly.
Cybersecurity Requirements. Contractor shall maintain 3rd-party attestation of compliance with any of the following certifications or standards during the life of this Agreement: • NIST 800-171, 800-53, CSF • Texas CSF • ISO27001 • SOC 2 • FedRAMP • TX-RAMP • Cloud Security Alliance STAR • PCI-DSS • HITRUST In the absence of 3rd-party attestation of compliance with these certifications or standards, Contractor should provide documentation around the following cybersecurity controls at a minimum: • Cybersecurity strategy and governance • Risk management framework • 3rd-Party/Supply Chain risk management • 3rd-Party penetration testing, including frequency • Data security o Encryption in transit and at rest o Data access by support personnelPersonnel screeningPhysical securitySoftware development life cycle security • Network access controls • Privileged level access controls • Disaster recovery and business continuity • Software Development Framework
Cybersecurity Requirements. Subgrantee must have a cybersecurity risk management plan in place that is either: (a) operational, if Subgrantee is providing service prior to the award of the grant; or (b) ready to be operationalized upon providing service, if Subgrantee is not yet providing service prior to the grant award. The plan must reflect the latest version of the National Institute of Standards and Technology (“NIST”) Framework for Improving Critical Infrastructure Cybersecurity (currently Version 1.1) and the standards and controls set forth in Executive Order 14028 and specify the security and privacy controls being implemented. The plan will be reevaluated and updated on a periodic basis and as events warrant and the plan will be submitted to MassTech prior to the allocation of funds. If Subgrantee makes any substantive changes to the plan, a new version will be submitted to MassTech within thirty (30) days.
Cybersecurity Requirements. The CONTRACTOR is liable in the event of negligence or, intentional misconduct, that compromises the security, confidentiality, or integrity of District Data or the physical, technical, administrative, or organizational safeguards put in place by the CONTRACTOR that relate to the protection of the security, confidentiality, or integrity of District Data. The CONTRACTOR shall, as applicable: (a) notify the District as soon as practicable but no later than twenty-four (24) hours of becoming aware of such occurrence; (b) cooperate with the District in investigating the occurrence, including making available all relevant records, logs, files, data reporting, and other materials required to comply with applicable law or as otherwise required by the District; (c) in the case of personally identifiable information (PII), at District’s sole election, (i) notify the affected individuals who comprise the PII as soon as practicable but no later than is required to comply with applicable law, or, in the absence of any legally required notification period, within five (5) calendar days of the occurrence; or, (ii) reimburse District for any costs in notifying the affected individuals, if, in the District’s sole discretion, the District notifies the affected individuals; (d) in the case of PII, provide third-party credit and identity monitoring services to each of the affected individuals who comprise the PII for the period required to comply with applicable law, or, in the absence of any legally required monitoring services, for no less than twelve (12) months following the date of notification to such individuals; (e) perform or take any other actions required to comply with applicable law as a result of the occurrence; (f) without limiting the District’s obligations of indemnification as further described in this Agreement, indemnify, and hold harmless the District for any and all Claims (as defined herein), including reasonable attorneys’ fees, costs, and expenses incidental thereto, which may be suffered by, accrued against, charged to, or recoverable from District in connection with the occurrence; (g) be responsible for recreating lost District Data in the manner and on the schedule set by District without charge to the District; and, (h) provide to the District a detailed plan within ten (10) calendar days of the occurrence describing the measures the CONTRACTOR will undertake to prevent a future occurrence. Notification to affected individuals, as described abov...
Cybersecurity Requirements. The USDS Servicer shall comply with the cybersecurity and privacy requirements as described in the 2022 Security and Privacy Requirements for Information Technology Procurements document within Attachment 3. Any solution making use of cloud services must use FedRAMP certified cloud packages and be approved by the Department for use. h. FSA Cybersecurity Requirements: The following sub-sections describe FSA Cybersecurity requirements that supplement Attachment 3. i. FSA
Cybersecurity Requirements. All Contractor employees requiring access to a Government information system shall successfully complete the Department of Defense (DoD) Cyber Awareness Challenge prior to access to the information technology.
Cybersecurity Requirements. Vendor shall be responsible for information technology (IT) cybersecurity for all systems that process, store, or transmit INEOS KOH data, regardless of location. This section is applicable to all or any part of the contract that includes information technology resources or services for which the Vendor has physical or electronic access to INEOS KOH’s data. The term “information technology”, as used in this Agreement, means any equipment, including telecommunications equipment that is used in the automatic acquisition, storage, manipulation, management, control, display, switching, interchange, transmission, or reception of data or information.

Related to Cybersecurity Requirements

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable. 2. Provide service site(s) that will promote attainment of Contractor’s program objectives. Arrange the physical environment to support those activities. 3. Decrease program costs when possible by procuring items at no cost from County surplus stores and by accepting delivery of such items by County.