Common use of Physical and Environmental Security Clause in Contracts

Physical and Environmental Security. 2.2.1.1 Procedures and facility hardening measures shall be adopted to prevent attempts at and detection of unauthorized access or damage to facilities that contain County information systems and/or processing facilities. 2.2.1.2 Restricted areas within facilities that house sensitive or critical County information systems shall, at a minimum, utilize physical access controls designed to permit access by authorized personnel only. 2.2.1.3 Physical protection measures against damage from external and environmental threats shall be implemented by all departments as appropriate. 2.2.1.4 Access to any office, computer room, or work area that contains sensitive information shall be physically restricted from unauthorized access. 2.2.1.5 Access points such as delivery and loading areas and other points where unauthorized persons may enter the premises shall be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access. An example of this would be separating the two areas by a badge-only accessible door. 2.2.1.6 Continuity of power shall be provided to maintain the availability of critical equipment and information systems. 2.2.1.7 Power and telecommunications cabling carrying data or supporting information services shall be protected from interception or damage. Different, yet appropriate methods shall be utilized for internal and external cabling. 2.2.1.8 Equipment shall be properly maintained to ensure its continued availability and integrity. 2.2.1.9 All shared IT infrastructure by more than one department shall meet countywide security policy for facility standards, availability, access, data & network security.

Appears in 8 contracts

Sources: Contract Ma 063 22010967, Contract for the Provision of Bringing Families Home Services, Contract for the Provision of Bridge Program Child Care Navigator, Trauma Informed Training and Coaching, and Emergency Child Care Voucher Services

Physical and Environmental Security. 2.2.1.1 Procedures and facility hardening measures shall be adopted to prevent attempts at and detection of unauthorized access or damage to facilities that contain County information systems and/or processing facilities. 2.2.1.2 Restricted areas within facilities that house sensitive or critical County information systems shall, at a minimum, utilize physical access controls designed to permit access by authorized personnel only. 2.2.1.3 Physical protection measures against damage from external and environmental threats shall be implemented by all departments as appropriate. 2.2.1.4 Access to any office, computer room, or work area that contains sensitive information shall be physically restricted from unauthorized access. 2.2.1.5 Access points such as delivery and loading areas and other points where unauthorized persons may enter the premises shall be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access. An example of this would be separating the two areas by a badge-only accessible door. 2.2.1.6 Continuity of power shall be provided to maintain the availability of critical equipment and information systems. 2.2.1.7 Power and telecommunications cabling carrying data or supporting information services shall be protected from interception or damage. Different, yet appropriate methods shall be utilized for internal and external cabling. 2.2.1.8 Equipment shall be properly maintained to ensure its continued availability and integrity. 2.2.1.9 All shared IT infrastructure by more than one department shall meet countywide security policy for facility standards, availability, access, data & network security.. Docusign Envelope ID: 720A06B8-0B1D-4BC0-90D5-335032640F9D

Appears in 1 contract

Sources: Contract for the Provision of Case Management Services

Physical and Environmental Security. 2.2.1.1 Procedures and facility hardening measures shall be adopted to prevent attempts at and detection of unauthorized access or damage to facilities that contain County information systems and/or processing facilities. 2.2.1.2 Restricted areas within facilities that house sensitive or critical County information systems shall, at a minimum, utilize physical access controls designed to permit access by authorized personnel only. 2.2.1.3 Physical protection measures against damage from external and environmental threats shall be implemented by all departments as appropriate. 2.2.1.4 Access to any office, computer room, or work area that contains sensitive information shall be physically restricted from unauthorized access. 2.2.1.5 Access points such as delivery and loading areas and other points where unauthorized persons may enter the premises shall be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access. An example of this would be separating the two areas by a badge-only accessible door. 2.2.1.6 Continuity of power shall be provided to maintain the availability of critical equipment and information systems. 2.2.1.7 Power and telecommunications cabling carrying data or supporting information services shall be protected from interception or damage. Different, yet appropriate methods shall be utilized for internal and external cabling. 2.2.1.8 Equipment shall be properly maintained to ensure its continued availability and integrity. 2.2.1.9 All shared IT infrastructure by more than one department shall meet countywide security policy for facility standards, availability, access, data & network security.. Docusign Envelope ID: 7489E300-8AF1-4335-9329-A29008757313

Appears in 1 contract

Sources: Contract

Physical and Environmental Security. 2.2.1.1 Procedures and facility hardening measures shall be adopted to prevent attempts at and detection of unauthorized access or damage to facilities that contain County information systems and/or processing facilities. 2.2.1.2 Restricted areas within facilities that house sensitive or critical County information systems shall, at a minimum, utilize physical access controls designed to permit access by authorized personnel only. 2.2.1.3 Physical protection measures against damage from external and environmental threats shall be implemented by all departments as appropriate. 2.2.1.4 Access to any office, computer room, or work area that contains sensitive information shall be physically restricted from unauthorized access. 2.2.1.5 Access points such as delivery and loading areas and other points where unauthorized persons may enter the premises shall be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access. An example of this would be separating the two areas by a badge-only accessible door. 2.2.1.6 Continuity of power shall be provided to maintain the availability of critical equipment and information systems. 2.2.1.7 Power and telecommunications cabling carrying data or supporting information services shall be protected from interception or damage. Different, yet appropriate methods shall be utilized for internal and external cabling. 2.2.1.8 Equipment shall be properly maintained to ensure its continued availability and integrity. 2.2.1.9 All shared IT infrastructure by more than one department shall meet countywide security policy for facility standards, availability, access, data & network security.policy

Appears in 1 contract

Sources: Passenger Loading Bridge and Baggage Handling System Maintenance