Common use of CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS Clause in Contracts

CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS. 3.2.1 Changes to all information processing facilities, systems, software, or procedures shall be strictly controlled according to formal change management procedures. 3.2.2 Changes impacting security appliances managed by OCIT (e.g., security architecture, security appliances, County firewall, Website listings, application listings, email gateway, administrative accounts) shall be reviewed by OCIT Enterprise Privacy and Cybersecurity in accordance with the County Security Review and Approval Process. 3.2.3 Only authorized users shall make any changes to system and/or software configuration files. 3.2.4 Only authorized users shall download and/or install operating system software, service-related software (such as web server software), or other software applications on County computer systems without prior written authorization from department IT management. This includes, but is not limited to, free software, computer games and peer-to-peer file sharing software. 3.2.5 Each department shall develop a formal change control procedure that outlines the process to be used for identifying, classifying, approving, implementing, testing, and documenting changes to its IT resources. 3.2.6 Each department shall conduct periodic audits designed to determine if unauthorized software has been installed on any of its computers. 3.2.7 As appropriate, segregation of duties shall be implemented by all County departments to ensure that no single person has control of multiple critical systems and the potential for misusing that control.

Appears in 2 contracts

Samples: Agreement for the Provision of Refugee Social Services, Passenger Loading Bridge and Baggage Handling System Maintenance

AutoNDA by SimpleDocs

CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS. 3.2.1 Changes to all information processing facilities, systems, software, or procedures shall be strictly controlled according to formal change management procedures. 3.2.2 Changes impacting security appliances managed by OCIT (e.g., security architecture, security appliances, County firewall, Website listings, application listings, email gateway, administrative accounts) shall be reviewed by OCIT Enterprise Privacy and Cybersecurity in accordance with the County Security Review and Approval Process. 3.2.3 Only authorized users shall make any changes to system and/or software configuration files. 3.2.4 Only authorized users shall download and/or install operating system software, service-related software (such as web server software), or other software applications on County computer systems without prior written authorization from department IT management. This includes, but is not limited to, free software, computer games and peer-to-peer file sharing software. 3.2.5 Each department shall develop a formal change control procedure that outlines the process to be used for identifying, classifying, approving, implementing, testing, and documenting changes to its IT resources. 3.2.6 Each department shall conduct periodic audits designed to determine if unauthorized software has been installed on any of its computers. 3.2.7 As appropriate, segregation of duties shall be implemented by all County departments to ensure that no single person has control of multiple critical systems and the potential for misusing that control.

Appears in 1 contract

Samples: Passenger Loading Bridge and Baggage Handling System Maintenance

CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS. 3.2.1 Changes to all information processing facilities, systems, software, or procedures shall be strictly controlled according to formal change management procedures. 3.2.2 Changes impacting security appliances managed by OCIT (e.g., security architecture, security appliances, County firewall, Website listings, application listings, email gateway, administrative accounts) shall be reviewed by OCIT Enterprise Privacy and Cybersecurity in accordance with the County Security Review and Approval Process. 3.2.3 Only authorized users shall make any changes to system and/or software configuration files. 3.2.4 Only authorized users shall download and/or install operating system software, service-related software (such as web server software), or other software applications on County computer systems without prior written authorization from department IT management. This includes, but is not limited to, free software, computer games and peer-to-peer file sharing software. 3.2.5 Each department shall develop a formal change control procedure that outlines the process to be used for identifying, classifying, approving, implementing, testing, and documenting changes to its IT resources. 3.2.6 Each department shall conduct periodic audits designed to determine if unauthorized software has been installed on any of its computers. 3.2.7 As appropriate, segregation of duties shall be implemented by all County departments to ensure that no single person has control of multiple critical systems and the potential for misusing that control.

Appears in 1 contract

Samples: Contract for the Provision of Basic Needs and Placement Preparation Services

AutoNDA by SimpleDocs

CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS. 3.2.1 Changes to all information processing facilities, systems, software, or procedures shall be strictly controlled according to formal change management procedures. 3.2.2 Changes impacting security appliances managed by OCIT (e.g., security architecture, security appliances, County firewall, Website listings, application listings, email gateway, administrative accounts) shall be reviewed by OCIT Enterprise Privacy and Cybersecurity in accordance with the County Security Review and Approval Process. 3.2.3 Only authorized users shall make any changes to system and/or software configuration files. 3.2.4 Only authorized users shall download and/or install operating system software, service-related software (such as web server software), or other software applications on County computer systems without prior written authorization from department IT management. This includes, but is not limited to, free software, computer games and peer-to-peer file sharing software. 3.2.5 Each department shall develop a formal change control procedure that outlines the process to be used for identifying, classifying, approving, implementing, testing, and documenting changes to its IT resources.. DocuSign Envelope ID: DFDCCE54-5078-4B9F-8718-13BBD8AD7054 3.2.6 Each department shall conduct periodic audits designed to determine if unauthorized software has been installed on any of its computers. 3.2.7 As appropriate, segregation of duties shall be implemented by all County departments to ensure that no single person has control of multiple critical systems and the potential for misusing that control.

Appears in 1 contract

Samples: Parcs Maintenance and Repair Contract

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!