Establishing secure connection… Loading editor… Preparing document…
Navigation

Fill and Sign the Information Security Program Requirements

Fill and Sign the Information Security Program Requirements

How it works

Open the document and fill out all its fields.
Apply your legally-binding eSignature.
Save and invite other recipients to sign it.

Rate template

4.5
50 votes
INFORMATION SECURITY PROGRAM REQUIREMENTS Checklist and Certifcatiin (2/2013) RFP Ni: _______________________________ _________________ Pre Silicitatiin Review Date: Cintract Ni:___________________________ _____________________ Pre-Award Review Date: Priject Title: _______________________________________________________________________________ Cintracting Officer:_________________________________________________________________________ [Name & Contact Information] Cintracting Officer:_________________________________________________________________________ [Name & Contact Information] PRE-SOLICITATION [ ] INFORMATION SECURITY IS NOT APPLICABLE fir this RFP. [ ] INFORMATION SECURITY IS APPLICABLE and the following information is required for RFP preparation: A. INFORMATION TYPE [ ] Administrative, Management and Suppirt Infirmatiin: [ ] Missiin Based Infirmatiin: B. SECURITY CATEGORIES AND LEVELS Confidentiality: Integrity: Availability: [ ] Low [ ] Moderate[ ] High [ ] Low [ ] Moderate[ ] High [ ] Low [ ] Moderate[ ] High Overall: [ ] Liw [ ] Miderate [ ] High C. POSITION SENSITIVITY DESIGNATIONS The following position sensitivity designations and associated clearance and investigation requirements apply under this contract: [ ] Level 6: Public Trust - High Risk (Requires Suitability Determinatiin with a BI). Contractor employees assigned to a Level 6 position are subject to a Background Investigation (BI). [ ] Level 5: Public Trust - Miderate Risk (Requires Suitability Determinatiin with MBI ir LBI). Contractor employees assigned to a Level 5 position with no previous investigation and approval shall undergo a Minimum Background Investigation (MBI), or a Limited Background Investigation (LBI). IT-Certification (Rev 2/2013) 1 [ ] Level 1: Nin Sensitive (Requires Suitability Determinatiin with an NACI). Contractor employees assigned to a Level 1 position are subject to a National Agency Check and Inquiry Investigation (NACI). D. PROSPECTIVE OFFEROR NON-DISCLOSURE AGREEMENT [ ] Offerors WILL NOT require access to sensitive information in order to prepare an offer. [ ] Offerors WILL require access to sensitive information in order to prepare an offer: Descriptiin if sensitive infirmatiin: ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ Select appropriate position sensitivity designation below. [ ] Level 6C: Sensitive - High Risk [ ] Level 5C: Sensitive - Miderate Risk CERTIFICATION: Based on the above, and contingent upon inclusion of all applicable solicitation language prescribed in the NIH Workform, we certify that the solicitation specifies appropriate security requirements necessary to protect the Governmentss interest and is in compliance with all Federal and DHHS security requirements. _________________________________________ Project Ofcer Signature ___________________ Date _________________________________________ Project Ofcer Typed Name _________________________________________ ___________________ Information Systems Security Ofcer Signature Date _________________________________________ Information Systems Security Ofcer Typed Name IT-Certification (Rev 2/2013) 2 INFORMATION SECURITY PROGRAM REQUIREMENTS Checklist and Certifcatiin (2/2013) RFP Ni: _______________________________ _________________ Pre Silicitatiin Review Date: Cintract Ni:___________________________ _____________________ Pre-Award Review Date: Priject Title: _______________________________________________________________________________ Cintracting Officer:_________________________________________________________________________ [Name & Contact Information] Cintracting Officer:_________________________________________________________________________ [Name & Contact Information] PRE-AWARD A. SYSTEMS SECURITY PLAN (SSP) [ ] SSP Apprived. The SSP dated ______________, submitted by the contractor has been reviewed by the Government, is considered acceptable, and should be incorporated into the awarded contract. [ ] This project requires a full SSP conforming to the NIST Guide for developing Security Plans for federal Information Systems http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf which must be submitted to the I/C, ISSO no later than 90 calendar days after the effective date of the contract. [ ] The SSP submitted by the contractor does not meet the minimum requirements for IT Security in the following area(s): [ ] Security Awareness Training [ ] Access Control [ ] Protection against data loss [ ] Malicious Code Protection [ ] Physical Security A revised SSP shall be submitted no later than 90 calendar days after the assignment of task (eg. hosting a government website) that would require such a plan. [ ] No SSP is required for this work. B. OFFEROR’S PROPOSAL [ ] Notwithstanding the information regarding the SSP, above, the offerorss proposal dated___________, specifies appropriate security requirements necessary IT-Certification (Rev 2/2013) 3 to comply with the Federal and Departmental policy. [ ] The offerorss proposal dated, __________ is deficient in the following areas: ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ [ ] No Award is recommended until the offeror submits additional information to resolve the deficiencies sited above. [ ] Award may be made contingent upon the inclusion of contract language stipulating the submission of additional information resolving the deficiencies cited above. This information must be submitted no later than 90 calendar days after the effective date of this contract. CERTIFICATION: Based on the above, and contingent upon inclusion of all applicable Contract language prescribed in the NIH Contract Workform, we certify that the contract specifies appropriate security requirements necessary to protect the Governmentss interest and is in compliance with all Federal and DHHS security requirements. _________________________________________ Project Ofcer Signature ___________________ Date _________________________________________ Project Ofcer Typed Name _________________________________________ ___________________ Information Systems Security Ofcer Signature Date _________________________________________ Information Systems Security Ofcer Typed Name IT-Certification (Rev 2/2013) 4

Useful tips on getting your ‘Information Security Program Requirements’ online

Are you fed up with the inconvenience of handling paperwork? Look no further than airSlate SignNow, the leading eSignature solution for individuals and businesses. Bid farewell to the tedious process of printing and scanning documents. With airSlate SignNow, you can effortlessly finalize and sign documents online. Leverage the powerful features integrated into this intuitive and affordable platform and transform your document management strategy. Whether you need to authorize forms or gather signatures, airSlate SignNow takes care of everything seamlessly, with just a few clicks.

Follow this comprehensive guide:

  1. Sign in to your account or initiate a free trial with our service.
  2. Click +Create to upload a file from your device, cloud storage, or our form library.
  3. Access your ‘Information Security Program Requirements’ in the editor.
  4. Click Me (Fill Out Now) to finalize the document on your end.
  5. Add and designate fillable fields for other individuals (if needed).
  6. Proceed with the Send Invite settings to solicit eSignatures from others.
  7. Download, print your version, or convert it into a reusable template.

Don't worry if you need to work with others on your Information Security Program Requirements or send it for notarization—our platform provides everything necessary to accomplish these tasks. Sign up with airSlate SignNow today and elevate your document management to new levels!

Here is a list of the most common customer questions. If you can’t find an answer to your question, please don’t hesitate to reach out to us.

Need help? Contact Support
Information security program requirements pdf
Information security Program pdf
Information security program example
List of security requirements
Information security program template
Which requirement of information security is addressed by implementing the plan
What is the purpose of a security policy in an organization
Needs for security
Information security program requirements for employees
Information security program example
List of security requirements
Information security Program pdf
Sign up and try Information security program requirements
  • Close deals faster
  • Improve productivity
  • Delight customers
  • Increase revenue
  • Save time & money
  • Reduce payment cycles