Information Technology Security Requirements. Exhibit F, “Information Technology Security Addendum” is attached and incorporated by this reference. CONSULTANT’s failure to comply with the requirements of Exhibit F is a material breach of this AGREEMENT.
Information Technology Security Requirements. This contract ☒shall not ☐shall be subject to Exhibit F, “Information Technology Security,” which is attached and incorporated by this reference. Contractor’s failure to comply with the requirements in Exhibit F is a material breach of this Agreement.
Information Technology Security Requirements. Employees must comply with Teton County security procedures and ensure adequate security measures are in place to protect the equipment and information housed or stored on assigned computers at their alternate work location. Failure to comply with security procedures and regulations may be grounds for disciplinary action.
Information Technology Security Requirements. See Attachment C for Information Technology Security Requirements Summary.