Federal Information Security Management Act Clause Samples

The Federal Information Security Management Act (FISMA) clause requires contractors and organizations handling federal information systems to implement and maintain robust security controls in accordance with federal standards. This typically involves conducting regular risk assessments, ensuring the confidentiality and integrity of sensitive data, and complying with specific reporting and incident response protocols. The core function of this clause is to protect government data from unauthorized access or breaches, thereby ensuring compliance with federal cybersecurity requirements and minimizing the risk of data compromise.
POPULAR SAMPLE Copied 3 times
Federal Information Security Management Act. (FISMA) In
Federal Information Security Management Act. (a) For Transition Services involving U.S. Government Data, Provider will deliver services in compliance with the Federal Information Security Management Act (“FISMA”) with a SC Sensitive Government Data type = {(confidentiality, MODERATE), (integrity, MODERATE), (availability, NOT APPLICABLE)}. ViaWest will construct and maintain the Tyco Space in accordance with such construction and maintenance requirements. (b) For Transition Services involving Classified Information or Technology, Provider will deliver services in compliance with the National Industry Security Program Operating Manual (DoD 5220.22-M) and FISMA, with a SC Classified Information type = {(confidentiality, HIGH), (integrity, HIGH), (availability, MODERATE)}.
Federal Information Security Management Act. The Counterparty will ensure that all information systems, electronic or hard copy, that contain federal data are protected from unauthorized access and will comply with the Federal Information Security Management Act (FISMA), Title III of the EGovernment Act of 2002, as amended (Pub. L. 107-347).
Federal Information Security Management Act 

Related to Federal Information Security Management Act

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Health Insurance Portability and Accountability Act Grantee certifies that it is in compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law ▇▇. ▇▇▇-▇▇▇, ▇▇ ▇▇▇ Parts 160, 162 and 164, and the Social Security Act, 42 USC 1320d-2 through 1320d-7, in that it may not use or disclose protected health information other than as permitted or required by law and agrees to use appropriate safeguards to prevent use or disclosure of the protected health information. Grantee shall maintain, for a minimum of six (6) years, all protected health information.