Security Requirements Schedule Clause Samples

Security Requirements Schedule. This Security Requirements Schedule establishes the standards for the security of Envestnet’s systems, whether hosted internally or remotely, and operational environment to ensure the confidentiality, availability and integrity of Fidelity Confidential Information. Envestnet shall comply with these standards in connection with Envestnet’s performance of Services under this Agreement.
Security Requirements Schedule. Physical Security The Contractor shall ensure that, as a minimum: protectively marked data is secured in appropriate security containers; windows, locks, doors and entry controls at premises owned or used by the Contractor or its Staff in connection with the provision of the Services meet appropriate security standards; and access to Authority Data, Confidential Information and Personal Data is restricted to Staff who have passed the relevant Staff Vetting Procedures and have a demonstrable need to have access to Authority Data to carry out their duties. The Contractor shall ensure that plans are in place for dealing with and intercepting unauthorised visitors and intruders. Accountability in respect of Authority Data The Contractor shall appoint at least one responsible person who is accountable for the assurance of Authority Data used in delivering the Services. The responsible person shall be: Name: [insert details] Address: [insert details] Telephone number: [insert details] E-mail address: The Contractor shall consult with the Authority in relation to any proposed change to the person accountable for the assurance of Authority Data. Structured Risk Assessment for Authority Data The Contractor shall ensure that it has undertaken a structured risk assessment which highlights when Authority Data is most vulnerable whilst in its care. The Contractor shall ensure that: it records the security risks identified as a result of such risk assessment in a risk register with such risk register to be made available to the Authority on request; the results of such risk assessment are taken into account when planning, selecting, designing and modifying its facilities. Data Handling Policies The Contractor shall have in place documented policies and procedures which are consistent with the requirements of the Contract and which govern the delivery of the Services with respect to: the level of security clearance required by Staff before they can access Authority Data; where Authority Data can be stored; when Authority Data can or cannot be transmitted electronically, by fax or discussed over the telephone; and when Authority Data can or cannot be sent via post or courier. Without prejudice to its obligations under the DPA (and clause 287), the Contractor shall have clear policies in place which cover, as a minimum, the following principles of the DPA: Personal Data is processed fairly and lawfully; Personal Data is obtained and only used for specified and lawful purpo...

Related to Security Requirements Schedule

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable. 2. Provide service site(s) that will promote attainment of Contractor’s program objectives. Arrange the physical environment to support those activities. 3. Decrease program costs when possible by procuring items at no cost from County surplus stores and by accepting delivery of such items by County.

  • City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.