SOV Cybersecurity Standard 2023-01 Clause Samples

The SOV Cybersecurity Standard 2023-01 clause establishes the minimum cybersecurity requirements that parties must adhere to when handling sensitive data or operating within a digital environment. It typically outlines specific technical and organizational measures, such as encryption protocols, access controls, and incident response procedures, that must be implemented to protect against cyber threats. By setting clear expectations for cybersecurity practices, this clause helps mitigate the risk of data breaches and ensures compliance with industry standards, thereby safeguarding both parties' digital assets and reputations.
SOV Cybersecurity Standard 2023-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 2023-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: ▇▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇.▇▇▇/cybersecurity/cybersecurity-standards-and-directives STATE OF VERMONT Contract # 45601 STANDARD CONTRACT FOR NASPO FULFILLMENT PARTNER By the State of Vermont: ▇▇▇▇▇▇ ▇ ▇▇▇▇▇ dba ▇▇ ▇▇▇▇▇ Communications Date: Date: Signature: Signature: Name: ▇▇▇▇▇▇▇▇ ▇.▇. ▇▇▇▇▇ Name: Title: BGS Commissioner Title: Contractor’s NASPO ValuePoint Webpage: ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/portfolio/public-safety- communications-products-services-and-solutions/jvc-kenwood-usa-corporation/
SOV Cybersecurity Standard 2023-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 2023-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: ▇▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇.▇▇▇/cybersecurity/cybersecurity-standards-and-directives
SOV Cybersecurity Standard 2023-01. All products and service provided to or for the use of the State under this Contract shall be in compliance with State of Vermont Cybersecurity Standard 2023-01, which Contractor acknowledges has been provided to it, and is available on-line at the following URL: ▇▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇.▇▇▇/cybersecurity/cybersecurity-standards-and-directives By the State of Vermont: By Red River Technology LLC Date: Date: Signature: Signature: Name: Name: Title: Title: Contractor: Cisco Systems, Inc. Contractor’s NASPO ValuePoint Webpage: ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/portfolio/data- communications-2019-2026/cisco-systems-inc/
SOV Cybersecurity Standard 2023-01. Contractor confirms that all products and services provided to or for the use of the State under this Agreement shall be in compliance with State of Vermont Cybersecurity Standard Update 2023-01, which prohibits the use of certain branded products in State information systems or any vendor system that is supporting State information systems, and is available on-line at: SOW-AGREEMENT # PRE-QUALIFICATION CONTRACT # 45685 (“Master Agreement”) This is a Statement of Work Agreement (“SOW Agreement”) between the State of Vermont, Agency of Transportation (hereafter called “State”) and ▇▇▇▇▇ Technologies, Inc., with principal place of business in Hatfield, PA (hereafter called “Contractor”). This SOW Agreement is entered into in accordance with the above-identified Master Agreement. This SOW Agreement shall supplement the Master Agreement and the parties acknowledge and agree that all of the terms and conditions of the Master Agreement are hereby incorporated by reference into this SOW Agreement.

Related to SOV Cybersecurity Standard 2023-01

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.