of September 14, 2015
About cooperation in the field of technical information security
The government of the Republic of Tajikistan and the Government of the Republic of Kazakhstan which are hereinafter referred to as by the Parties
being guided by regulations of the Agreement between the Government of the Republic of Tajikistan and the Government of the Republic of Kazakhstan on mutual protection of the classified information against May 4, 2006,
understanding that lack of regulation of the relations in the field of technical information security with limited access, in particular, by prevention of information leakage on technical channels, unauthorized access to it, violation of its integrity or blocking, can cause damage to the states of the Parties,
agreed as follows:
In this agreement the terms provided below are used in the following values:
"the coordinating body" - state body on which responsibility for general control and implementation of provisions of this agreement in the states of the Parties is conferred;
"authorized body" - state body or the organization which according to national legal systems of the states of the Parties are authorized to provide technical information security;
"technical information security" - complex of actions for prevention of information leakage on technical channels, unauthorized access to it, the prevention of impacts with at the purpose of destruction (destruction) or misstatement of information in the course of its creation, storage, processing, transfer or to blocking of access to it;
"means of information protection" - technical, cryptographic, program and other means, substances go the materials intended or used for information security, means in which they are realized, and also control facilities of efficiency of information security;
"information with limited access" - documentary information, right of access to which it is limited according to national legal systems of the states of the Parties.
The parties cooperate in the field of technical information security, on the basis of mutual respect, equality of the Parties, their interests and recognition of the right in the field of homeland security.
The questions which are not settled by this agreement, and also international treaties which participants are the states of the Parties will be solved according to the national legal system of the states of the Parties.
Каждаж from the Parties takes necessary measures for ensuring the information security with limited access transferred to it by other Party in compliance with the national legal system of the state.
The parties not transfer information with limited, access to other states, legal entities and physical persons, the third parties without written consent the Parties from which this information is obtained.
The parties according to national legal systems of the states determine the coordinating and authorized bodies what notify the friend of drzt through diplomatic channels within thirty days from the effective date of this agreement on.
In case of changes of the coordinating and/or authorized bodies of the states of the Parties, the Parties timely notify each other on it through diplomatic channels.
The parties hold consultations and exchange work experience on enhancement of ensuring technical information security with limited access, to creation and harmonization of national systems of standardization, metrology, certification, licensing and insurance regarding technical information security, to forming of single terminology in this sphere. The parties hold negotiations (consultation) on creation of the corresponding working groups, for the purpose of the solution of the questions following from provisions of this agreement.
The parties perform cooperation in the following areas:
- development and use of normative and methodical documents and regulatory legal acts in the field of technical information security;
- preparation, use and advanced training of personnel on the basis of the approved qualification requirements to graduates of the relevant twisting educational institutions, technical information security specialists;
- development production, delivery scientifically - technical products and means of information protection, their use;
- provision of services concerning technical information security;
- holding joint conferences, symposiums and exhibitions in the field of technical information security;
- exchange of information about new methods and means of technical information security;
- experience exchange in questions of carrying out special researches and to inspection of regime rooms.
Education documents and qualifications of specialists in the field of technical information security issued in the states of the Parties are recognized the Parties according to the national legal system, the host state.
Financing of the events held within this agreement is performed by the Parties according to the procedure and on the terms of the states of the Parties provided by national legal systems.
Disputes and disagreements over interpretation or application of provisions of this agreement are solved by negotiations or consultations between the Parties.
In case of the solution of matters of argument of the Party continue to fulfill the obligations according to provisions of this agreement.
By mutual consent of the Parties changes and additions which are drawn up by the separate protocols and the being integral parts of this agreement which are becoming effective according to the procedure, stipulated in Article the 11th this agreement can be made to this agreement.
Disclaimer! This text was translated by AI translator and is not a valid juridical document. No warranty. No claim. More info
Database include more 50000 documents. You can find needed documents using search system. For effective work you can mix any on documents parameters: country, documents type, date range, teams or tags.
More about search system
If you cannot find the required document, or you do not know where to begin, go to Help section.
In this section, we’ve tried to describe in detail the features and capabilities of the system, as well as the most effective techniques for working with the database.
You also may open the section Frequently asked questions. This section provides answers to questions set by users.