Security Operations Clause Samples

POPULAR SAMPLE Copied 1 times
Security Operations manages support of implemented security solutions, monitors and scans the environment and assets, and manages incident response.
Security Operations the IS function manages support of implemented security solutions, monitors and scans the environment and assets, and manages incident response.
Security Operations. CONTRACTOR shall provide all Security Operations in accordance with ACA Standards, and the FDC’s security procedures only to such extent as it is not in direct conflict with ACA Standards. CONTRACTOR shall provide a Security Operations Plan to the On-Site Contract Monitor prior to the Service Commencement Date. The plan shall be reviewed annually and updated as needed. Documentation of this review shall be provided annually to the On-Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.
Security Operations. 38.1 The City and the UNION and its officers, agents and members recognize there are assignments within the Miami Police Department where security of information is an absolute necessity. Therefore, the Chief of Police at his sole discretion may reject an employee to such assignment within the Miami Police Department when the Chief has reason to believe that there is potential for the Security of the Department to be compromised. 38.2 Upon request of the UNION President, the Department of Human Resources designee will review such denial of assignment. Said review will be final and the decision of the Department of Human Resources designee will be binding and not subject to any appeal procedure.
Security Operations. ▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ Information System Security Officer (ISSO) District 2, Southern Territory Service OperationsEnterprise Security Operations ▇▇▇▇ ▇▇▇▇▇▇▇ ▇▇▇▇▇ ▇▇▇▇ Columbia, SC 29209 Telephone: (▇▇▇) ▇▇▇-▇▇▇▇ Email: ▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇.▇▇▇
Security Operations. Manager shall manage and implement security services at the ARTIC Site.
Security Operations. Supplier shall maintain operational security policies, procedures, and controls in accordance with industry standard practices. At a minimum, such policies and procedures shall cover and such controls shall include: (i) ensuring Buyer Information is logically and/or physically segregated; (ii) firewalls; (iii) network intrusion detection; (iv) regularly updated anti-virus software; (v) application of security patches in accordance with industry standards; (vi) commercially reasonable vulnerability scans; (vii) continuously assessing and tracking vulnerabilities on network assets; (viii) monitoring for unauthorized access, within Supplier’s network and/or applications, to ensure that unauthorized persons, computers, computer programs or networks do not have access to or use of Buyer Information; (ix) an annual penetration test of Supplier’s key systems and applications carried out by an independent third-party; (x) collecting, alerting, and reviewing audit logs of events that could help detect, understand, or recover from an adverse event; (xi) protect and detect against threats from email and web vectors, and (xii) monitoring public and private industry sources for new threat and vulnerability information. Upon request, Supplier shall provide a copy of the penetration test results to Buyer.
Security Operations i. Provide internet services and support which include Internet address management, web caching, content filtering, bandwidth management, Internet authentication, firewall service, and Virtual Private Network Management ii. Email security iii. Anti-virus scanning and support iv. Security consulting services v. Security incident investigation and reporting
Security Operations. Wirespeed has a security operations program function which monitors, triages, and responds to security alerts across the organization.
Security Operations. Information Sharing Establish formal liaison with law enforcement and implement procedures for receiving and disseminating threat information. Training Conduct new employee security awareness training. Conduct and maintain records of annual security awareness training. Security Management Designate a knowledgeable security professional to manage security of the facility. Ensure subOfferor compliance with BARDA security requirements.