Information Technology Security Requirements Sample Clauses

Information Technology Security Requirements. Exhibit F, “Information Technology Security Addendum” is attached and incorporated by this reference. CONSULTANT’s failure to comply with the requirements of Exhibit F is a material breach of this AGREEMENT.
AutoNDA by SimpleDocs
Information Technology Security Requirements. This contract ☒shall not ☐shall be subject to Exhibit F, “Information Technology Security,” which is attached and incorporated by this reference. Contractor’s failure to comply with the requirements in Exhibit F is a material breach of this Agreement.
Information Technology Security Requirements. Employees must comply with Teton County security procedures and ensure adequate security measures are in place to protect the equipment and information housed or stored on assigned computers at their alternate work location. Failure to comply with security procedures and regulations may be grounds for disciplinary action.
Information Technology Security Requirements. See Attachment C for Information Technology Security Requirements Summary.

Related to Information Technology Security Requirements

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!