INFORMATION TECHNOLOGY REQUIREMENTS. A. If applicable to the performance of services under this Contract, CONTRACTOR shall coordinate with COMMISSION’s Information Technology (“IT”) Department regarding the design, development, structure and implementation of IT components required under this Contract, including databases, documents and spreadsheets, and apply, as appropriate, the following IT specifications:
1. Hardware and software compatibility with industry hardware, software and security standards to allow adequate compatibility with COMMISSION’s infrastructure.
2. Open Data Base Connectivity (“ODBC”) compliant for data collection and dissemination purposes.
3. Ability to collect information at the client-level, as necessary.
4. Compatibility and ability to aggregate information in multiple ways: by initiatives, geographic boundaries, service types, program outcomes, and COMMISSION outcomes.
5. Ability to export to and import the data collected.
B. CONTRACTOR shall timely notify COMMISSION of any major problem with CONTRACTOR’s hardware or software that may impact CONTRACTOR’s performance of services under this Contract.
INFORMATION TECHNOLOGY REQUIREMENTS. 28.1. If applicable to the programs and services conducted under this Grant Agreement, GRANTEE shall coordinate with COMMISSION’s Information Technology (“IT”) Department regarding the design, development, structure and implementation of IT components required under this Grant Agreement, including databases, documents and spreadsheets, and apply, as appropriate, the following IT specifications:
28.1.1. Hardware and Software compatibility with industry hardware, software and security standards to allow adequate compatibility with COMMISSION’s infrastructure.
28.1.2. Open Data Base Connectivity (“ODBC”) compliant for data collection and dissemination purposes.
28.1.3. Ability to collect information at the client-level, as necessary.
28.1.4. Compatibility and ability to aggregate information in multiple ways: by initiatives, geographic boundaries, service types, program outcomes, and COMMISSION outcomes.
28.1.5. Ability to export to and import the data collected.
28.2. GRANTEE shall timely notify COMMISSION of any major problem with GRANTEE’s hardware or software that may impact GRANTEE’s provision of the programs and services required under this Grant Agreement.
INFORMATION TECHNOLOGY REQUIREMENTS. A. If applicable to the performance of services under this Contract, CONTRACTOR shall coordinate with COMMISSION’s Information Technology (“IT”) Department regarding the design, development, structure and implementation of IT components required under this Contract, including databases, documents and spreadsheets, and apply, as appropriate, the following IT specifications:
1. Hardware and software compatibility with industry hardware, software and security standards to allow adequate compatibility with COMMISSION’s infrastructure.
2. Open Data Base Connectivity (“ODBC”) compliant for data collection and dissemination purposes.
3. Ability to collect information at the client-level, as necessary.
INFORMATION TECHNOLOGY REQUIREMENTS. If this Grant involves information technology-related products or services, Grantee agrees that any such product or services are compatible with the technology standards, including the assistive technology standard, that can be found at xxxxx://xxx.xx.xxx/iot/2394.htm. IOCS may terminate this Grant if the terms of this paragraph are breached.
INFORMATION TECHNOLOGY REQUIREMENTS. (a) The Health Services Manager must provide, install, manage and support information technology systems that:
(i) have the software, hardware, encryption and scanning capacity and functionality to support compliance with the Contract;
(ii) are capable of collecting, storing, downloading and reporting health information and health data in accordance with the Contract;
(iii) comply with the logical security requirements of the Australian Government Information Security Manual, with the exception of components provided by the Department, in which case the Department is responsible for compliance with the Australian Government Protective Security Policy Framework in relation to those components;
(iv) meet the Department's security and privacy requirements for data and information protection, including by encrypting information classified as sensitive;
(v) are housed in secure locations adequate to prevent unauthorised access. Where a location for information technology systems is provided by the Department, the Department will be responsible for that location’s security except to the extent that an act or omission of the Health Services Manager results in a breach of security;
(vi) are appropriately licensed at all times;
(vii) have the capacity and flexibility to respond to fluctuations in service demand and volumes;
(viii) are properly maintained, supported and available at all necessary times for performance of the Health Services;
(ix) are updated and maintained on a regular basis;
(x) minimise multiple Transferee records; and
(xi) are in all respects suitable and appropriate for the performance of the Health Services, and are able to be easily used by appropriately trained Health Services Manager Personnel.
(b) Before the end of each day, the Health Services Manager must produce a back up of all electronic data created or used in connection with the Contract, and store that data in a secure and safe location.
(c) The Health Services Manager must provide appropriate and timely training for Health Services Manager Personnel in the use of information technology relevant to their role and responsibilities in connection with the Contract.
INFORMATION TECHNOLOGY REQUIREMENTS. The Second Party shall ensure the following requirements are met:
A.- Make provisions for obtaining computer hardware and software that meets or exceeds minimum specifications of the Kentucky Department of Education.
INFORMATION TECHNOLOGY REQUIREMENTS. 29.1. If applicable to the programs and services conducted under this Grant Agreement, GRANTEE shall coordinate with COMMISSION’s Information Technology (“IT”) Department regarding the design, development, structure and implementation of IT components required under this Grant Agreement, including databases, documents and spreadsheets, and apply, as appropriate, the following IT specifications:
INFORMATION TECHNOLOGY REQUIREMENTS. CSI will provide such records and data processing tools as necessary, to provide the Services set for herein, either through its own information technology ("IT") resources or those of its affiliates and third party contractors. INTERNETWORKING will give CSI prompt written notice of any modifications to its existing records and data systems, when it augments such systems or obtains new records and data systems, that may materially affect CSI's ability to provide services hereunder.
INFORMATION TECHNOLOGY REQUIREMENTS. (a) Each Party shall use all reasonable efforts, including operating commercially available anti-virus applications (and maintaining up to date virus definitions for such applications), to ensure that no portion of the activities conducted under this Agreement comprising software will contain any unauthorized code, or virus, Trojan horse, worm, or any other software routine or hardware component designed to permit, either automatically or through externally applied controls, unauthorized access or use to disable, erase, or otherwise harm software, hardware, or data (collectively “Viruses”). To the extent that any Party, in conducting activities under this Agreement, uses any system or software belonging to the other Party, such Party shall use its best efforts to avoid the introduction of any Viruses into such systems or software.
(b) To the extent that any Viruses are discovered in any deliverables provided under this Agreement or is introduced to a Party’s systems or software by the other Party (or is reasonably likely to have been so introduced), such other Party shall use all reasonable efforts to assist the Party to which the Virus was delivered in removing such Viruses from the software in question and shall be responsible for the costs of such removal.
(c) Each Party shall ensure that it has up to date information on all personnel who have access to the other Party’s IT systems and agrees to provide periodic updates on the names of such personnel. Each Party shall, no more than twenty-four (24) hours after any change in such information or any new information, notify the other Party promptly of any individual IT user access change.
(d) Both Parties agree to maintain reasonable security measures, in line with industry best practices for systems storing, accessing, or otherwise processing any Data (irrespective of levels as defined in Schedule 1.68) of this Agreement. Such security measures shall be subject to mutual reporting, review and oversight by the Data Access Committee. Parties agree to coordinate in good faith regarding any requested updates or modifications to the security practices of the other Party as applicable to the Collaboration, and acknowledge that the discovery of any serious security vulnerability or security incident may result in a delay or interruption in Data transfer, as set forth in Schedule 1.68.
(e) 23andMe shall seek independent third party accreditation for any system(s) accessing, storing and/or otherwise processing any...
INFORMATION TECHNOLOGY REQUIREMENTS. The provider shall use computer laboratory information management software (LIMS), which will maintain a database including a register of all local women within the NHSCSP, for failsafe purposes, and is easily auditable. Data collection for trend analysis shall be required, statistical quality returns (KC61), as well as the capability to transfer information to the call/recall agency.