Information Technology (IT Sample Clauses

Information Technology (IT. Security
AutoNDA by SimpleDocs
Information Technology (IT. CLASSIFICATIONS Page 23 of 73 CATEGORY A: *IT = means Information Technology Page 24 of 73 Payment – Invoicing Instructions: The Contractor will provide an invoice on the Contractor’s letterhead for services rendered. Invoices must be submitted to address indicated in the Subordinate Contract created by the individual agency/department. Each invoice must have a unique number and must include the following information: a) Contractor’s name and address; b) Contractor’s remittance address; c) Contractor’s Federal Tax I.D. Number; d) Name of County Agency/Department; e) Delivery/Service address; f) DO Number/Subordinate Agreement Number g) Date of order/services rendered; h) Service description, # hours, and hourly rate(s) i) Total 1. Billing shall cover services not previously invoiced. The Contractor shall reimburse the County for any monies paid to the Contractor for services not provided or when services do not meet the Contract requirements. 2. Payments made by the County shall not preclude the right of the County from thereafter disputing any services involved or billed under this Contract and shall not be construed as acceptance of any part of the services.
Information Technology (IT. SCI runs its IT group centrally, allowing for specialists (programmers, help-desk, system administrators, etc.) to perform services at all Hotel/Casinos. This centralization and allocation eliminates the need for each Hotel/Casino to hire specialists and purchase related equipment. Direct costs, such as maintenance or service agreements for on- property equipment, are billed directly to the applicable Hotel/Casinos. Indirect costs (primarily payroll and related benefits costs) are allocated to the Hotel/Casinos based upon percentage of total revenue.
Information Technology (IT. IT provides oversight of the Parties’ technology plans. This includes strategic planning, system standardization and information security, as well as management of the Subsidiaries’ IT managers. The expense reimbursement methodology is based on estimated costs incurred by the applicable Party.
Information Technology (IT. 41 The symbols indicating the right to sign urban planning documents are defined in the Regulation on the organization and operation of the Romanian Register of Urban Planners (cf. Decision 101/2010 of the RUR Scientific Council, Annex 2, Article 16, § 11 (5). The correspondence between the symbols used in the 2006 Regulation and those in the 2010 Regulation is available at: xxxxx://xxx.xx/2Ihwl48 [29 September 2023 08:57:22]. 42 Cf. MO no. 2701/2010 and MO no. 233/2016, as consolidated up to 29 September 2023 08:57:22. 43 Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 11, § 1 (a). 44 The words "or equivalent" must be read in accordance with Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 6, §§ 4-6. 45 CF. ibid., Annex 1, Article 11, § 2. 46 Cf. MO no. 2701/2010 and MO no. 233/2016, both as consolidated up to 29 September 2023 08:57:22. 47 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (a). 48 CF. ibid., Annex 1, Article 11, § 2. 49 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 50 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (b). 51 CF. ibid., Annex 1, Article 11, § 2. 52 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 53 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (c). 54 CF. ibid., Annex 1, Article 11, § 2. 55 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 56 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (d). 57 CF. ibid., Annex 1, Article 11, § 2. 58 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 59 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (e). 60 CF. ibid., Annex 1, Article 11, § 2. 61 Cf. MO no. 562/2003, in its updated form valid on 29 September 2023 08:57:22, Annex. 62 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 63 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (f). 64 CF. ibid., Annex 1, Article 11, § 2. 65 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 2023 08:57:22, Annex 2. 66 Cf. Decision 101/2010 of the RUR Scientific Council, Annex 1, Article 12, § 3 (g). 67 CF. ibid., Annex 1, Article 11, § 2. 68 Cf. MO no. 233/2016, in its consolidated form valid on 29 September 202...
Information Technology (IT. All aspects of technology used to develop, transfer and store information and data including but not limited to Products, software, IT systems, networks, Internet-enabled applications, cloud applications used by them and common IT interfaces.
Information Technology (IT. Cyber Security Requirements 8.1) All participant information must be protected from cyber-attacks. Safeguards must include computers equipped with antivirus software that receive regular patches and updates from software vendors to correct security problems, improve functionality, and defend against viruses, malware, and other online threats. 8.2) Configure all software (operating system, anti-malware, and applications), to install updates automatically. 8.3) Set antivirus software to run a scan after each update. 8.4) All operating systems must have a firewall enabled or firewall software installed for Internet connection. 8.5) Data must be backed up at least weekly on all computers storing participant information. Data includes email, documents, spreadsheets, databases, financial, human resources, and accounts receivable/payable files. 8.6) All computers and portable devices containing participant information must be stored and locked when not in use and be set for automatic locking after a period of nonuse (e.g., five (5) minutes). 8.7) All mobile devices containing participant information must be password protected and use data encryption and security apps to prevent unauthorized access while the phone is on public networks. 8.8) Ensure Wi-Fi networks are secure, encrypted, and hidden from public access. 8.9) Password protect router access and disable guest Wi-Fi access. 8.10) Use unique passwords and full disk encryption protection. 8.11) Set the operating system to change passwords every three (3) months. 8.12) Use passwords that are at least eight (8) characters, complex, contain a special character like #, $, and a capitalized letter and changed every 90 days. 8.13) Maintain company policies on cyber security. Policies must include: 8.13)1. Penalties for violating company information technology security policies. 8.13)2. Instructions on how to report lost or stolen equipment.
AutoNDA by SimpleDocs
Information Technology (IT. For the period of this Agreement, SSPD will not perform IT work on any Government contract except to the extent necessary to complete transition activities on the SOFSA contract.
Information Technology (IT. IT employees shall stagger the 4/10 schedule to ensure the IT services will have sufficient coverage. All days and hours will be pre-approved by the Assistant City Manager prior to April of each year and can be changed by management for business operational needs at any time consistent with Section 5.3.1.
Information Technology (IT. Integration
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!