Information Technology Security Standards Sample Clauses

Information Technology Security Standards. (1) The Contractor and its Staff and the Subcontractors and their Staff shall comply with the following: (a) All security standards, practices, and procedures which are equal to or exceed those of the DCYF (which security standards, practices, and procedures of DCYF shall have been provided to Contractor in writing); and (b) The Washington State Office of the Chief Information Officer IT Standards. (2) The parties agree to implement physical, electronic, and managerial policies, procedures, and safeguards to prevent the unauthorized access, use, or disclosure of Sensitive Personal Information of In-home Caregivers, Data, and Confidential Information. The Contractor shall make the Sensitive Personal Information of In-home Caregivers, Data, and Confidential Information available to amend as directed by DCYF and incorporate any amendments into all the copies maintained by the Contractor or their Subcontractors.
AutoNDA by SimpleDocs
Information Technology Security Standards. When working with non-public data from the State of Hawaii, have processes for: • Security incident notification. Notify the State of Hawaii if an incident lead to unauthorized disclosure of non-public information and mitigation steps to reduce further risk to the State of Hawaii. • Technical requirements. Implements technical requirements that are aligned with the CIS controls: xxxxx://xxx.xxxxxxxxxx.xxx/controls/ • Security policies and standards. Implement security policies that are aligned with the NIST 800-53. Based on the sensitivity of the data more stringent controls from 800-53 would be required: xxxxx://xxxx.xxxx.xxx/publications/detail/sp/800-53/rev- 5/final
Information Technology Security Standards. 7.7.1. The Center and its staff shall comply with the following: 7.7.1.1. All security standards, practices, and procedures which are equal to or exceed those of the PSESD (which security standards, practices, and procedures of PSESD shall have been provided to Center in writing); and 7.7.1.2. The Washington State Office of the Chief Information Officer IT Standards. 7.7.2. The parties agree to implement physical, electronic, and managerial policies, procedures, and safeguards to prevent unauthorized access, use, or disclosure of Sensitive Personal Information of In-Home Caregivers, Data, and Confidential Information. The Center shall make the Sensitive Personal Information of In-Home Caregivers, Data, and Confidential Information available to amend as directed by PSESD and incorporate any amendments into all the copies maintained by the Center.
Information Technology Security Standards. 11.3.1 The Contractor and its staff and the subcontractors and their staff shall comply with the following: 11.3.1.1 The Contractor shall assure that its security practices and safeguards for DEL data meet Washington State Office of the Chief Information Officer IT Standards provided and maintained in the following URL: xxxxx://xxxx.xx.xxx/policies/141-securing-information-technology-assets/14110- securing-information-technology-assets. 11.3.1.2 DEL shall provide in writing any DEL specific standards, practices, and safeguards that the Contactor must meet that are not covered in OCIO Policy 141. 11.3.2 The parties agree to implement physical, electronic, and managerial policies, procedures, and safeguards to prevent unauthorized access, use, or disclosure of data and confidential information. The Contractor shall make the data and confidential information available to amend as directed by DEL and incorporate any amendments into all the copies maintained by the Contractor or their Subcontractors.
Information Technology Security Standards. 6.3.1. The Center and its staff shall comply with the following: 6.3.1.1. The Center shall assure that its security practices and safeguards for data related to this Contract meet Washington State Office of the Chief Information Officer IT Standards provided and maintained in thefollowing URL: xxxxx://xxxx.xx.xxx/policies/141-securing- information-technology-assets/14110-securing-information-technology-assets. 6.3.1.2. PSESD shall provide in writing any specific standards, practices, and safeguards that the Center must meet that are not covered in OCIO Policy 141. 6.3.2. The parties agree to implement physical, electronic, and managerial policies, procedures, and safeguards to prevent unauthorized access, use, or disclosure of data and confidential information. The Center shall make the data and confidential information available to amend as directed by PSESD and incorporate any amendments into all the copies maintained by the Center.
Information Technology Security Standards. The Contractor and any subcontractors, dealers, distributors, resellers, and other partners shall adhere to applicableCommonwealth Office of Technology (COT) Policies and Standards: Commonwealth Office of Technology - Home - Commonwealth Office of Technology (Kentucky)
Information Technology Security Standards a. Executive Order 184. Executive Order 184 relating to Cybersecurity and Prohibiting the Use of Certain Foreign Technologies directs the Wisconsin Department of Administration to take measures to ensure certain prohibited vendors and technologies are not used on State IT networks. Accordingly, the following vendors and/or software are prohibited from being provided to any Purchasing Entity: Participating Addendum Number 505ENT-O24-NASPOCOMPUT-10 for COMPUTER EQUIPMENT, PERIPHERALS & RELATED SERVICES NetApp U.S. Public Sector, Inc.
AutoNDA by SimpleDocs

Related to Information Technology Security Standards

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!