Development 3.3 Within twenty (20) Working Days after the Commencement Date and in accordance with paragraphs 3.10 to 3.12 (Amendment and Revision), the Contractor will prepare and deliver to the Authority for approval the full and final Security Plan which will be based on the draft Security Plan set out in Appendix B.
Product Development Attach all requested documentation and attach additional pages as necessary. For all requirements include efforts of all Sublicensees. If not applicable, please so indicate by N/A.
Information Systems Acquisition Development and Maintenance ● Product features are managed through a formalized product management process. Security requirements are discussed and formulated during scoping and design discussions. ● XxxXxxx maintains a QA Department dedicated to reviewing and testing application functionality and stability. ● Application source code is stored in a central repository. Access to source code is limited to authorized individuals. ● Changes to MaxMind software are tested before production deployment. Deployment processes include unit testing at the source environment, as well as integration and functional testing within a test environment prior to implementation in production.
Research Support opioid abatement research that may include, but is not limited to, the following: