Information Technology and Security Requirements Sample Clauses

Information Technology and Security Requirements. Contractor agrees to perform the work set forth in this Agreement in accordance with the City’s Information Technology and Security Requirements, which are attached hereto as Exhibit G and incorporated herein.
AutoNDA by SimpleDocs
Information Technology and Security Requirements. MOD Corporate Internet Accessibility Policy. JSP 440 - The Defence Manual of Security. JSP 440 is the single MOD reference on Security Policy issued under the Authority of DGS&S. It draws on the Government wider Security Policy guidance produced by the Cabinet Office Security Policy Division. JSP 717 - Using the MOD Metadata Standard. JSP 740 - Acceptable Use Policy for Users of MOD Information Technology and telecommunications networks (MOD IT and Telecoms). JSP 745 - Ministry of Defence Web Publishing Policy. JSP 747 - Information Management Policy and Protocols. Suggested Software Standards ISO/IEC 12207 - Software Life Cycle Systems and software engineering - Software life cycle processes. ISO 90003 - Guidance for the application of ISO 9001 to software. Task Quotation and Authorisation Procedures Tasks to be performed under the contract shall be approved by the Projects Team on Task Data Sheets(TDS), copy attached at Annex A ANNEX A TASK DATA FORM CONTRACT CTLBC/2015 Task Number Part 1The Requirement Signature Name Post Date Part 2Company Proposal Detail (use continuation sheet if necessary) Signature Name Post Date Part 3 – MAA Authority to Proceed Signature Name Post Date Part 4 – MAA Financial Authority to Proceed Signature Name Post Date Part 5– MAA Commercial Authority to Proceed Signature Name Post Date Part 6 – Vistair Confirmed Actual Expenditure Net Cost VAT Amount Total Invoice Amount Signature Name Post Date Part 7MAA Acceptance Signature Name Post Date Schedule 3 Conditions of Contract CTLBC/2015

Related to Information Technology and Security Requirements

  • INFORMATION TECHNOLOGY The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • Data Security Requirements A. Data Transport. When transporting Confidential Information electronically, including via email, the data will be protected by:

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

Time is Money Join Law Insider Premium to draft better contracts faster.