Specific Security Requirements Clause Samples

Specific Security Requirements. 1. Seller warrants that it shall comply with all applicable laws and regulations regarding data security and privacy including, but not limited to, ▇▇▇▇▇-▇▇▇▇▇-▇▇▇▇▇▇ Act, HIPAA, and the provisions of 201 CMR 17.00 of the Code of Massachusetts Regulations for the Protection of PII.
Specific Security Requirements. StarCompliance shall not use Client Data except as permitted by the Agreement. StarCompliance has established appropriate administrative, technical, and physical safeguards to protect the confidentiality of, and to prevent the unauthorized use or access to, Client Data.
Specific Security Requirements. Any Criminal Justice Information Services and/or Health Information Portability and Accountability Act-specific security requirements are attached in a separate addendum, if applicable.
Specific Security Requirements. In addition to the foregoing, Seller shall implement and adhere to the following specific Raytheon security requirements, receipt of which Seller hereby acknowledges: Seller shall monitor access and security logs using commercially acceptable practices and tools for unusual activity including the following: • Excessive unauthorized/failed logon attempts, • Use of admin accounts at unusual times, • Unusual activity at any time, • Missing activity date/time ranges within the logs, • Failed backups Seller should support integration with Raytheon’s Simplified Sign-On (SSO) infrastructure, enabling Raytheon users to login to the service with their Raytheon SSO credentials. Where user authentication via Raytheon SSO is not a current capability and is performed with reusable passwords, adherence to Raytheon Password Requirements is mandatory. At a minimum: • Passwords are not easily guessed. Password complexity checking is enabled with minimum password length of eight characters. • Initial passwords are changed by the user on first use. • Passwords are changed immediately if compromise is suspected and are expired every 90 days. • Passwords are not reused for a period of one year (e.g., history is 4 where supported). • Passwords are not shared with others. • Passwords are not displayed, stored, or transmitted in plain text or readable form. • Passwords are disabled after the fifth failed authentication attempt in succession. • Additions and changes to access levels of users must be approved by appropriate Raytheon management. • Accounts to be disabled will be communicated by Raytheon and must be enacted by supplier in a timely manner. • Automated authentication Processes such as logon scripts, are protected from unauthorized access and do not contain unencrypted passwords. • Support procedures for remotely “resetting” a forgotten, lost or compromised means of user identity authentication must at a minimum: 1) Incorporate multiple means of proving the user’s identity when the user is not present to display positive photo identification. 2) These means must be something that has a high probability of only being known to the user and not general knowledge or easily guessable. 3) Identity verification data should only be viewable by authorized personnel. 4) Provide a confirmation of the "reset" to the user via a method other than the method of access reset. Seller's Information Security Program shall include, but not be limited, to the following safeguards to ensure ...
Specific Security Requirements. The parties shall not use or further disclose the data specified in this Contract except as permitted by this Contract or as required by federal law, including the Health Information Portability and Accountability Act (HIPAA) and the Health Information Technology Economic and Clinical Health (HITECH) Act, their associated regulations, 45 CFR §§ 160, 162 and 164, and applicable Florida law. Disclosure to the Office is expressly permitted under federal law for complying with state law, and Florida and the Office is an “authorized public official” rather than a "covered entity" under federal law. See 45 C.F.R. §§ 164.512 and .514. The parties have established appropriate administrative, technical, and physical safeguards to protect the confidentiality and to prevent unauthorized use or access to the data specified in this Contract. Further, the uses and disclosures shall be in accordance with applicable Florida law.
Specific Security Requirements. There is a risk that MOD civilians and their dependants working and living in NI or ROI, may be targeted by extremist organisations. Special precautions are essential to conceal the association with MOD for all employees and dependants within Northern Ireland. There is a requirement to make referrals of all types, without specifying a home address if the employee declines to provide this to the OH Service Provider. Any process for verification of identity must not rely on validation of employee home address. OH Service Provider mail sent to a home address shall not include any reference to Ministry of Defence; Guard Service; grade or rank on the envelope. At OH Service Provider clinics held outside MOD Sites, employees shall not be referred to by grade, rank or reference made to employment with MOD within public areas. The OH Service Provider is to be a member of the ‘Disability Confident’ employer scheme. See ▇▇▇▇▇://▇▇▇.▇▇▇.▇▇/government/collections/disability-confident-campaign MOD require additional knowledge, experience or accreditation in the following areas: The OH Service provided to MOD is to be Consultant led and accredited by the Faculty of Occupational Medicine to SEQOHS standards throughout the period of the contract. OH Service Provider must follow guidance issued by Public Health England, meet the requirements set out by NHS Employers for NHS Occupational Health Services and be able to demonstrate that it offers the enhanced competencies for Occupational Physicians caring for Healthcare Practitioners, published by the Faculty of Occupational Medicine. Where the Department of Health and Social Care, Public Health England, NHS Employers or the Faculty of Occupational Medicine amend the guidance referred to here, the OH Service Provider is to ensure it maintains coherence with that amended guidance. Clinicians with mental health qualifications and experience. Clinicians experienced in providing OH services to UK Fire Services. Clinicians aware of the demands both physically and psychologically associated with the armed policing role. Clinicians with knowledge and understanding of Maritime Coastal Agency medical standards; the seafaring environment and working practices Clinicians appointed by the HSE to conduct statutory medicals, as required by the following regulations, or later updated versions: Ionising Radiation Regulations 2017 Control of Lead at Work Regulations 2002 Control of Asbestos Regulations 2012 Control of Substances Hazardous to...
Specific Security Requirements. The Contractor shall not use SBA Data except as permitted by the Agreement. The Contractor has established appropriate administrative, technical, and physical safeguards to protect the confidentiality of, and to prevent the unauthorized use or access to, SBA Data.
Specific Security Requirements a) The Data Processor and Sub-processors shall implement the following measures and documents with respect to Customer Personal Data: i) The data security programme and associated physical, technical, organisational and security measures shall be documented in writing by the Data Processor and shall comply in all material respects with the Information Security Management System (ISMS) family of standards as published by the Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), also known as the ISO/IEC 27000 series, may be modified or replaced from time to time. ii) Provide a secondary authentication (two-factor authentication (2FA)) like a security token or biometric factor, as well as a password.
Specific Security Requirements 

Related to Specific Security Requirements

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • Residency Requirements 1. All single first-year freshmen students are required to live in University housing for at least two academic semesters. All single students who have earned less than 30 credit hours and have not resided in University housing for two academic semesters are required to live on campus for two academic semesters. This policy does not apply to single first-year students who have been out of high school for more than one year, or to single first-year freshmen who live with their parents in Miami-Dade or Broward Counties. Neither does it apply to those students who, for disciplinary or administrative reasons, may be denied the privilege of continued residency on campus. 2. Undergraduate students residing in University housing must be regularly enrolled students of the University, taking a minimum of 12 credit hours each semester. Graduate students (when housed by exception) must carry a minimum of nine credit hours per semester. To apply and sign-up for University Village apartments, students must have 45 or more completed academic credits. In order to move into University Village, students must have 60 or more completed academic credits or have completed 4 academic semesters at the University and be achieving satisfactory academic progress as defined by the University Bulletin.