Operational Security. (a) Each Recipient shall have implemented as of the Award Date and thereafter comply with (including through the provision of adequate resources and staffing) operational security plans, policies and procedures for each Project which shall include, at a minimum, the following elements: (i) controls to protect physical security through defined perimeters and restricted areas; visitor control processes including visit requests, identification, vetting, and escort procedures; and processes to identify individuals and control accesses; and (ii) controls to mitigate insider threats by vetting employees and contractors in the US, identifying and monitoring for threat indicators, establishing reporting thresholds, and training employees and contractors on insider threat indicators and reporting procedures. (b) [***]
Appears in 2 contracts
Sources: Direct Funding Agreement (Micron Technology Inc), Direct Funding Agreement (Micron Technology Inc)
Operational Security. (a) Each Recipient shall have implemented as of the Award Date and thereafter comply with (including through the provision of adequate resources and staffing) operational security plans, policies and procedures for each Project which shall include, at a minimum, the following elements:
(i) controls to protect physical security through defined perimeters and restricted areas; visitor control processes including visit requests, identification, vetting, and escort procedures; and processes to identify individuals and control accesses; and
(ii) controls to mitigate insider threats by vetting employees and contractors in the US, identifying and monitoring for threat indicators, establishing reporting thresholds, and training employees and contractors on insider threat indicators and reporting procedures.
(b) [***].
Appears in 1 contract