Reproduction controls Clause Samples

Reproduction controls. (1) Repro- duction of classified documents is pro- hibited, except by personnel authorized in writing by the Chairman or Security Officer. (2) TOP SECRET documents may not be reproduced without the consent of the originating agency unless other- wise marked by the originating office. (3) Reproduction of SECRET and CONFIDENTIAL documents may be re- stricted by the originating agency. (4) Reproduced copies of classified documents are subject to the same ac- countability and controls as the origi- nal documents. (5) Records shall be maintained by the Security Officer to show the num- ber and distribution or reproduced cop- ies of all TOP SECRET documents, of all documents covered by special ac- cess programs distributed outside the originating agency, and all SECRET and all CONFIDENTIAL documents which are marked with special dissemi- nation and reproduction limitations.

Related to Reproduction controls

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data. b. User Access - DST shall have a process to promptly disable access to Fund Data by any DST personnel who no longer requires such access. DST will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Personnel Controls The County agrees to advise Contractor Staff, who have access to PII, of the confidentiality of the information, the safeguards required to protect the information, and the civil and criminal sanctions for non-compliance contained in applicable federal and state laws. For that purpose, the Contractor shall implement the following personnel controls:

  • Agreement Controls The terms and conditions of this Master Agreement control over the terms and conditions contained in an Approved Service Order – even if the Approved Service Order expressly states that it is intended to control. Any conflicting terms and conditions in an Approved Service Order are invalid and unenforceable.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.