Rules of Behavior Clause Samples
Rules of Behavior. The Contractor shall ensure that all employees, including subcontractor employees, comply with the NIH Information Technology General Rules of Behavior (▇▇▇▇▇://▇▇▇▇.▇▇▇.▇▇▇/InfoSecurity/training/Pages/nihitrob.aspx), which are contained in the NIH Information Security Awareness Training Course ▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇.▇▇▇.
Rules of Behavior. 1. The Contractor (and/or any subcontractor) shall ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior, and comply with the NIH Information Technology General Rules of Behavior ▇▇▇▇▇://▇▇▇▇.▇▇▇.▇▇▇/InfoSecurity/training/Pages/nihitrob.aspx, which are contained in the NIH Information Security Awareness Training Course ▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇.▇▇▇
2. All Contractor employees performing on the contract must read and adhere to the Rules of Behavior before accessing Department data or other information, systems, and/or networks that store/process government information, initially at the beginning of the contract and at least annually thereafter, which may be done as part of annual NIH Information Security Awareness Training. If the training is provided by the contractor, the signed Rules of Behavior must be provided as a separate deliverable to the CO and/or COR per defined timelines above.
Rules of Behavior. If You purchase ▇▇▇▇▇▇’s FedRAMP SaaS Environment then You, along with Your system administrators, employees, contractors, end-users, and other third parties who are given access to the FedRAMP SaaS Environment, are subject to the FedRAMP Rules of Behavior located at ▇▇▇▇://▇▇▇.▇▇▇▇▇▇.▇▇▇/company/legal/fedramp.
Rules of Behavior. CMS shall: The Non-CMS Organization shall:
Rules of Behavior. Rules of Behavior are part of a comprehensive program to provide complete information security. These guidelines were established to hold users accountable for their actions and responsible for information security. Rules of Behavior establish █HH█UU█DD█--22█55█2222█288█((█0055█//22█00█222█2)) standards of behavior in recognition of the fact that knowledgeable users are the foundation of a successful security program. Users need to understand that taking personal responsibility for the security of their computer and the data it contains is an essential part of their job.
Rules of Behavior. You acknowledge that access to the broadband data in the NBAM is intended only for the purposes of improving the nationwide understanding of broadband availability, improving broadband policymaking, and improving decision-making associated with public investments in broadband, pursuant to the Consolidated Appropriations Act of 2018, Public Law 115–141, Division B, Title I, 132 Stat. 348.
Rules of Behavior. Both parties shall ensure that all users with access to the CMS Network, the CMS information system, the Non-CMS Organization network and any data received from the other organization shall adhere to all current HHS Rules of Behavior (RoB) (For Use of Technology Resources and Information), which is available at ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/Research-Statistics-Data-and-Systems/CMS-Information-Technology/InformationSecurity/Info-Security-Library-Items/HHS-Rules-of-Behavior-for-Use-of-HHS-Information-and-IT-Resources-Policy.html?DLPage=1&DLEntries=10&DLFilter=rule&DLSort=0&DLSortDir=ascending
Rules of Behavior a. The Contractor (and/or any subcontractor) must ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior and HHS Rules of Behavior for Privileged Users.
b. All Contractor employees performing on the contract must read and adhere to the Rules of Behavior before accessing Department data or other information, systems, and/or networks that store/process government information, initially at the beginning of the contract and at least annually thereafter, which may be done as part of annual HHS/OASH Information Security Awareness Training. If the training is provided by the contractor, the signed ▇▇▇ must be provided as a separate deliverable to the CO and/or COR per defined timelines above.
Rules of Behavior. 12F • Ensure that all CMS system users with access to the CMS Network shall adhere to all current HHS Rules of Behavior. 13 • Require that all users with access to the Non-CMS Organization’s system and its connection with the Hub, adhere to the terms of this ISA and the EDE Agreement executed between the Non-CMS Organization and CMS. • Require the Non-CMS Organization’s Rules of Behavior provide protections that are commensurate with current HHS Rules of Behavior.
Rules of Behavior. 1) The Contractor (and/or any subcontractor) shall ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior.
2) All Contractor employees performing on the contract must read and adhere to the Rules of Behavior (ROB) before accessing HHS and FDA data or other information, systems, and/or networks that store/process government information, initially at the beginning of the contract and at least annually thereafter, which may be done as part of annual FDA Information Security Awareness Training. If the training is provided by the contractor, the signed ▇▇▇ must be provided as a separate deliverable to the CO and/or COR per defined timelines.