Technical Services Party B will provide technical services and training to Party A, taking advantage of Party B’s advanced network, website and multimedia technologies to improve Party A’s system integration. Such technical services shall include: (a) administering, managing and maintaining Party A’s information application system and website system infrastructure; (b) providing system optimization plans and implementing optimization features; (c) assuring the security and reliability of the website application systems; (d) procuring, installing and supporting the relevant products produced by Party B, and providing training in the use of those products; (e) managing and maintaining all network and providing technologies to assure the reliability and efficiency thereof; (f) providing information technology services and assuring the reliable operation of the information infrastructure.
Engineering Services Definition: Engineering Services includes any service or creative work, the adequate performance of which requires education, training and experience in the application of special knowledge in consulting, investigating, evaluating, planning and designing, engineering principles. Engineering Services covered by the Xxxxxx Architect-Engineers Act (40 U.S.C. 1102) are not covered in the primary scope of OASIS SB. Examples: Service areas that are included under the Engineering Services discipline include, but are not limited to the following: 1. Systems Engineering 2. Advanced Technology Pilots and Trials 3. Alternative Energy Sources and Engineering 4. Configuration Management 5. Concept Development
Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.