Information Systems Security Clause Samples

The Information Systems Security clause establishes requirements and standards for protecting the confidentiality, integrity, and availability of information systems used in the course of a contract or business relationship. It typically mandates that parties implement appropriate technical and organizational measures, such as access controls, encryption, and regular security assessments, to safeguard data against unauthorized access or cyber threats. This clause serves to minimize the risk of data breaches and ensure compliance with relevant security regulations, thereby protecting both parties from potential financial and reputational harm.
Information Systems Security. If the individual purchase order is for operationally critical support or for which performance will involve covered defense information, Supplier is required to provide adequate security on all covered contractor information systems. To provide such security, Supplier must implement information security protections, including compliance with the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.” See DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting (DEC 2019). Federal Acquisition Regulation (FAR) Clauses GOVERNMENT (SEP 2006) (Applicable to purchase orders that exceed the simplified acquisition threshold ($150,000)).
Information Systems Security. All the technical and non-technical means of protection, allowing an Information System to withstand events likely to compromise the availability, integrity and confidentiality of data processed or transmitted and the related services that these systems offer or make accessible. 3DS OUTSCALE Service(s) or Service(s): The IaaS services ordered by the CLIENT in the framework of the Agreement and subject to this Service Agreement in application thereof.
Information Systems Security. A comprehensive information technology security policy shall be developed on the basis of an approved strategy for information and communication technology to ensure confidentiality, integrity and availability of all data: (a) Information systems security shall be based on the criteria laid down in the version applicable in the financial year concerned of International Standards Organisation 17799/British Standard 7799: Code of practise for Information Security Management (BS ISO/IEC 17799) and any guidelines on the application of these standards established by the Commission. (b) Security measures shall be adapted to the administrative structure, staffing and technological environments of each individual structure, authority or body of the management and control systems. The financial and technological effort shall be in proportion to the actual risks incurred.
Information Systems Security. In the event this Agreement or an Order provides for remote access to Company’s electronic information systems (“CIS”) by Provider, Provider shall at all times protect CIS through procedures and tools deemed satisfactory to Company. Such procedures and tools shall include without limitation: (i) A mechanism to determine and immediately report to Company possible security breaches; (ii) Controls to ensure the return or destruction, at Company’s direction, of information transmitted through CIS; (iii) A process for maintaining the confidentiality, integrity and availability of information transmitted through CIS; and (iv) Methods for controlling access to CIS, which shall include without limitation (i) permitted access methods; (ii) an authorization process for users’ access and privileges; and (iii) maintenance of a list of authorized users.
Information Systems Security. Employees working for the Lake Preston School District at alternative work sites should use District provided computers and other devices that have been approved by the Technology Department. It is not recommended for Remote workers to use their own mobile computing devices, computers, or computer software. Remote Working networks should all be password secured and systems that access Lake Preston networks remotely must have an anti-malware (anti-virus) package, an endpoint protection software package installed that protects the network from advanced threats, and multi-factor authentication steps that have been approved by the Technology Department.
Information Systems Security. If Nortel grants Seller access to Nortel’s information systems, Seller will safeguard the security of Nortel’s information systems, as set out in Exhibit O, attached to and incorporated in this Agreement.
Information Systems Security. A major goal of our Information Security Program is to defend against security intrusion through a combination of layered prevention technologies and comprehensive security monitoring. Our security infrastructure has been designed according to industry standards for virus protection, firewalls and intrusion‐prevention technologies in order to prevent unauthorized access or compromises of CDW’s network, systems and servers. To maintain this level of security, CDW: • Isolates guest wireless networks and unauthenticated connectivity from CDW internaltraffic
Information Systems Security. The Supplier shall ensure that the information system provided under this Contract shall comply with all applicable state and Federal laws and amendments, regulations and policies relating to Medicaid and system security, confidentiality, integrity, availability, and safeguarding of information, including: i. Title XIX of the Social Security Act; ii. National Institute of Standard and Technology, NIST SP 800-53 for security and privacy controls guidance; iii. HIPAA Security Rule, 45 CFR Part 160 and Subparts A and C of Part 164, established under the Health Insurance Portability and Accountability Act; iv. Privacy Act of 1974; v. Federal Information Security Management Act (FISMA) of 2002; vi. Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH); vii. Federal Information Processing Standards (FIPS), Publication 140-2.
Information Systems Security. 1.8.1 Generally, includes the installation, configuration, administration, operation, maintenance, and monitoring of security and backup/recovery processes as well as network security systems 1.8.2 Backup/recovery support with procedural development and testing 1.8.3 Consulting services through the identification and analysis of emerging technologies to improve or enhance the County's security posture to protect its data network, systems, workstations, and servers from internal and external attacks 1.8.4 Network monitoring services including: 1.8.4.1 Surveillance of network traffic, performance, and security to ensure the integrity and security of the County’s networks and all its related components (human element, physical and virtual servers, domain controllers, desktops, laptops, printers, and other devices which utilize the County network)
Information Systems Security. The Board and the Recorder will jointly provide information systems security services. The Parties will cooperate and coordinate with respect to these security services, consistent with all State and Federal laws and regulations governing election security, including, but not limited to, threat monitoring, video recording, and cyber-attack prevention. Both the Recorder and the Board will work with the Maricopa County Sheriff’s Office and other law enforcement agencies as warranted under this section.