INFORMATION TECHNOLOGY REQUIREMENTS Clause Samples
The INFORMATION TECHNOLOGY REQUIREMENTS clause sets out the specific standards, protocols, and obligations related to the use, management, and security of information technology systems within the scope of an agreement. It typically details requirements such as software compatibility, data protection measures, cybersecurity protocols, and compliance with relevant IT regulations. By clearly defining these expectations, the clause ensures that both parties maintain compatible and secure IT environments, reducing the risk of data breaches and operational disruptions.
POPULAR SAMPLE Copied 1 times
INFORMATION TECHNOLOGY REQUIREMENTS. A. If applicable to the performance of services under this Contract, CONTRACTOR shall coordinate with COMMISSION’s Information Technology (“IT”) Department regarding the design, development, structure and implementation of IT components required under this Contract, including databases, documents and spreadsheets, and apply, as appropriate, the following IT specifications:
1. Hardware and software compatibility with industry hardware, software and security standards to allow adequate compatibility with COMMISSION’s infrastructure.
2. Open Data Base Connectivity (“ODBC”) compliant for data collection and dissemination purposes.
3. Ability to collect information at the client-level, as necessary.
4. Compatibility and ability to aggregate information in multiple ways: by initiatives, geographic boundaries, service types, program outcomes, and COMMISSION outcomes.
5. Ability to export to and import the data collected.
B. CONTRACTOR shall timely notify COMMISSION of any major problem with CONTRACTOR’s hardware or software that may impact CONTRACTOR’s performance of services under this Contract.
INFORMATION TECHNOLOGY REQUIREMENTS. 28.1. If applicable to the programs and services conducted under this Grant Agreement, GRANTEE shall coordinate with COMMISSION’s Information Technology (“IT”) Department regarding the design, development, structure and implementation of IT components required under this Grant Agreement, including databases, documents and spreadsheets, and apply, as appropriate, the following IT specifications:
28.1.1. Hardware and Software compatibility with industry hardware, software and security standards to allow adequate compatibility with COMMISSION’s infrastructure.
28.1.2. Open Data Base Connectivity (“ODBC”) compliant for data collection and dissemination purposes.
28.1.3. Ability to collect information at the client-level, as necessary.
28.1.4. Compatibility and ability to aggregate information in multiple ways: by initiatives, geographic boundaries, service types, program outcomes, and COMMISSION outcomes.
28.1.5. Ability to export to and import the data collected.
28.2. GRANTEE shall timely notify COMMISSION of any major problem with GRANTEE’s hardware or software that may impact GRANTEE’s provision of the programs and services required under this Grant Agreement.
INFORMATION TECHNOLOGY REQUIREMENTS. A. If applicable to the performance of services under this Contract, CONTRACTOR shall coordinate with COMMISSION’s Information Technology (“IT”) Department regarding the design, development, structure and implementation of IT components required under this Contract, including databases, documents and spreadsheets, and apply, as appropriate, the following IT specifications:
1. Hardware and software compatibility with industry hardware, software and security standards to allow adequate compatibility with COMMISSION’s infrastructure.
2. Open Data Base Connectivity (“ODBC”) compliant for data collection and dissemination purposes.
3. Ability to collect information at the client-level, as necessary.
INFORMATION TECHNOLOGY REQUIREMENTS. If this Grant involves information technology-related products or services, Grantee agrees that any such product or services are compatible with the technology standards, including the assistive technology standard, that can be found at ▇▇▇▇▇://▇▇▇.▇▇.▇▇▇/iot/2394.htm. IOCS may terminate this Grant if the terms of this paragraph are breached.
INFORMATION TECHNOLOGY REQUIREMENTS. 29.1. If applicable to the programs and services conducted under this Grant Agreement, GRANTEE shall coordinate with COMMISSION’s Information Technology (“IT”) Department regarding the design, development, structure and implementation of IT components required under this Grant Agreement, including databases, documents and spreadsheets, and apply, as appropriate, the following IT specifications:
INFORMATION TECHNOLOGY REQUIREMENTS. (a) The Health Services Manager must provide, install, manage and support information technology systems that:
(i) have the software, hardware, encryption and scanning capacity and functionality to support compliance with the Contract;
(ii) are capable of collecting, storing, downloading and reporting health information and health data in accordance with the Contract;
(iii) comply with the logical security requirements of the Australian Government Information Security Manual, with the exception of components provided by the Department, in which case the Department is responsible for compliance with the Australian Government Protective Security Policy Framework in relation to those components;
(iv) meet the Department's security and privacy requirements for data and information protection, including by encrypting information classified as sensitive;
(v) are housed in secure locations adequate to prevent unauthorised access. Where a location for information technology systems is provided by the Department, the Department will be responsible for that location’s security except to the extent that an act or omission of the Health Services Manager results in a breach of security;
(vi) are appropriately licensed at all times;
(vii) have the capacity and flexibility to respond to fluctuations in service demand and volumes;
(viii) are properly maintained, supported and available at all necessary times for performance of the Health Services;
(ix) are updated and maintained on a regular basis;
(x) minimise multiple Transferee records; and
(xi) are in all respects suitable and appropriate for the performance of the Health Services, and are able to be easily used by appropriately trained Health Services Manager Personnel.
(b) Before the end of each day, the Health Services Manager must produce a back up of all electronic data created or used in connection with the Contract, and store that data in a secure and safe location.
(c) The Health Services Manager must provide appropriate and timely training for Health Services Manager Personnel in the use of information technology relevant to their role and responsibilities in connection with the Contract.
INFORMATION TECHNOLOGY REQUIREMENTS. The Second Party shall ensure the following requirements are met:
A.- Make provisions for obtaining computer hardware and software that meets or exceeds minimum specifications of the Kentucky Department of Education.
INFORMATION TECHNOLOGY REQUIREMENTS. CSI will provide such records and data processing tools as necessary, to provide the Services set for herein, either through its own information technology ("IT") resources or those of its affiliates and third party contractors. INTERNETWORKING will give CSI prompt written notice of any modifications to its existing records and data systems, when it augments such systems or obtains new records and data systems, that may materially affect CSI's ability to provide services hereunder.
INFORMATION TECHNOLOGY REQUIREMENTS. Each Party shall use all reasonable efforts, including operating commercially available anti-virus applications (and maintaining up to date virus definitions for such applications), to ensure that no portion of the activities conducted under this Agreement comprising software will contain any unauthorized code, or virus, Trojan horse, worm, or any other software routine or hardware component designed to permit, either automatically or through externally applied controls, unauthorized access or use to disable, erase, or otherwise harm software, hardware, or data (collectively “Malwares”). To the extent that any Party, in conducting activities under this Agreement, uses any system or software belonging to the other Party, such Party shall use its best efforts to avoid the introduction of any Malwares into such systems or software.
13.9.1 To the extent that any Malwares are discovered in any deliverables provided under this Agreement or is introduced to a Party’s systems or software by the other Party (or is reasonably likely to have been so introduced), such other Party shall use all reasonable efforts to assist the Party to which the Malware was delivered in removing such Malware from the software in question and shall be responsible for the costs of such removal.
13.9.2 Each Party shall ensure that it has up to date information on all personnel who have access to the other Party’s IT systems and agrees to provide periodic updates on the names of such personnel. Each Party shall, no more than [***] after any change in such information or any new information, notify the other Party promptly of any individual IT user access change.
13.9.3 Both Parties agree to maintain reasonable security measures, in line with industry best practices for systems storing, accessing, or otherwise processing any Data. The Parties agree to coordinate in good faith regarding any requested updates or modifications to the security practices of the other Party as applicable to the Collaboration.
INFORMATION TECHNOLOGY REQUIREMENTS. A. If applicable to the performance of work or the provision of deliverables under this Contract, CONTRACTOR shall coordinate with COMMISSION’s Information Technology (“IT”) Department regarding the design, development, structure and implementation of IT components required under this Contract, including databases, documents and spreadsheets, and apply, as appropriate, the following IT specifications:
A. Hardware and software compatibility with industry hardware, software and security standards to allow adequate compatibility with COMMISSION’s infrastructure.
B. Open Data Base Connectivity (“ODBC”) compliant for data collection and dissemination purposes.
C. Ability to collect information at the client-level, as necessary.
D. Compatibility and ability to aggregate information in multiple ways: by initiatives, geographic boundaries, service types, program outcomes, and COMMISSION outcomes.
E. Ability to export to and import the data collected.
B. CONTRACTOR shall timely notify COMMISSION of any major problem with CONTRACTOR’s hardware or software that may impact CONTRACTOR’s performance of work or provision of deliverables under this Contract.
