Common use of Common Security Configurations Clause in Contracts

Common Security Configurations. The provider of information technology shall certify applications are fully functional and operate correctly as intended on systems using the Federal Desktop Core Configuration (FDCC). This includes Internet Explorer 7 configured to operate on Windows XP and Vista (in Protected Mode on Vista). For the Windows XP settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_WinXP.html, and for the Windows Vista settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_vista.html. The standard software installation, operation, maintenance, update, and/or patching processes shall not alter the approved FDCC configuration settings. The information technology provider should also use the Windows Installer Service for installation to the default “program files” directory and should be able to silently install and uninstall. Applications designed for normal end users shall run in the standard user context without elevated system administration privileges.

Appears in 3 contracts

Samples: Blanket Purchase Agreement, Blanket Purchase Agreement, Blanket Purchase Agreement

AutoNDA by SimpleDocs

Common Security Configurations. The provider of information technology shall certify applications are fully functional and operate correctly as intended on systems using the Federal Desktop Core Configuration (FDCC). This includes Internet Explorer 7 configured to operate on Windows XP and Vista (in Protected Mode on Vista). For the Windows XP settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_WinXP.html, and for the Windows Vista settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_vista.html. The standard software installation, operation, maintenance, update, and/or patching of processes shall not alter the approved FDCC configuration settings. The information technology provider should also use the Windows Installer Service for installation to the default “program files” directory and should be able to silently install and uninstall. Applications designed for normal end users shall run in the standard user context without elevated system administration privileges.

Appears in 2 contracts

Samples: Blanket Purchase Agreement, Blanket Purchase Agreement

AutoNDA by SimpleDocs

Common Security Configurations. The provider of information technology shall certify applications are fully functional and operate correctly as intended on systems using the Federal Desktop Core Configuration (FDCC). This includes Internet Explorer 7 configured to operate on Windows XP and Vista (in Protected Mode on Vista). For the Windows XP settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_WinXP.html, and for the Windows Vista settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_vista.html. The standard software installation, operation, maintenance, updateupdates, and/or patching processes of software shall not alter the configuration settings from the approved FDCC configuration settingsconfiguration. The information technology provider should also use the Windows Installer Service an installer service for installation to the default "program files" directory and should be able to silently install and uninstall. Applications designed for normal end users shall run in the standard user context without elevated system administration privileges.

Appears in 2 contracts

Samples: Blanket Purchase Agreement, Blanket Purchase Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!