Information Technology Security Standards Sample Clauses

Information Technology Security Standards. (1) The Contractor and its Staff and the Subcontractors and their Staff shall comply with the following:
AutoNDA by SimpleDocs
Information Technology Security Standards. When working with non-public data from the State of Hawaii, have processes for: • Security incident notification. Notify the State of Hawaii if an incident lead to unauthorized disclosure of non-public information and mitigation steps to reduce further risk to the State of Hawaii. • Technical requirements. Implements technical requirements that are aligned with the CIS controls: xxxxx://xxx.xxxxxxxxxx.xxx/controls/ • Security policies and standards. Implement security policies that are aligned with the NIST 800-53. Based on the sensitivity of the data more stringent controls from 800-53 would be required: xxxxx://xxxx.xxxx.xxx/publications/detail/sp/800-53/rev- 5/final
Information Technology Security Standards. 7.7.1. The Center and its staff shall comply with the following: 7.7.1.1. All security standards, practices, and procedures which are equal to or exceed those of the PSESD (which security standards, practices, and procedures of PSESD shall have been provided to Center in writing); and 7.7.1.2. The Washington State Office of the Chief Information Officer IT Standards. 7.7.2. The parties agree to implement physical, electronic, and managerial policies, procedures, and safeguards to prevent unauthorized access, use, or disclosure of Sensitive Personal Information of In-Home Caregivers, Data, and Confidential Information. The Center shall make the Sensitive Personal Information of In-Home Caregivers, Data, and Confidential Information available to amend as directed by PSESD and incorporate any amendments into all the copies maintained by the Center.
Information Technology Security Standards. 6.3.1. The Center and its staff shall comply with the following:
Information Technology Security Standards. The Contractor and any subcontractors, dealers, distributors, resellers, and other partners shall adhere to applicableCommonwealth Office of Technology (COT) Policies and Standards: Commonwealth Office of Technology - Home - Commonwealth Office of Technology (Kentucky)
Information Technology Security Standards a. Executive Order 184. Executive Order 184 relating to Cybersecurity and Prohibiting the Use of Certain Foreign Technologies directs the Wisconsin Department of Administration to take measures to ensure certain prohibited vendors and technologies are not used on State IT networks. Accordingly, the following vendors and/or software are prohibited from being provided to any Purchasing Entity: TikTok Huawei Technologies ZTE Corp Hytera Communications Corporation Hangzhou Hikvision Digital Technology Company Dahua Technology Company Tencent Holdings, including but not limited to: o Tencent QQ o QQ Wallet Participating Addendum Number 505ENT-O24-NASPOCOMPUT-10 for COMPUTER EQUIPMENT, PERIPHERALS & RELATED SERVICES Between State of Wisconsin and NetApp U.S. Public Sector, Inc. o WeChat Alibaba products, including but not limited to: o AliPay Kaspersky Lab

Related to Information Technology Security Standards

  • INFORMATION TECHNOLOGY The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!